Exam Details

  • Exam Code
    :RC0-501
  • Exam Name
    :CompTIA Security+ Recertification Exam
  • Certification
    :CompTIA Security+
  • Vendor
    :CompTIA
  • Total Questions
    :349 Q&As
  • Last Updated
    :Mar 29, 2025

CompTIA CompTIA Security+ RC0-501 Questions & Answers

  • Question 321:

    Ann a security analyst is monitoring the IDS console and noticed multiple connections from an internal host to a suspicious call back domain. Which of the following tools would aid her to decipher the network traffic?

    A. Vulnerability Scanner

    B. NMAP

    C. NETSTAT

    D. Packet Analyzer

  • Question 322:

    An administrator is testing the collision resistance of different hashing algorithms. Which of the following is the strongest collision resistance test?

    A. Find two identical messages with different hashes

    B. Find two identical messages with the same hash

    C. Find a common has between two specific messages

    D. Find a common hash between a specific message and a random message

  • Question 323:

    The SSID broadcast for a wireless router has been disabled but a network administrator notices that unauthorized users are accessing the wireless network. The administer has determined that attackers are still able to detect the presence of

    the wireless network despite the fact the SSID has been disabled.

    Which of the following would further obscure the presence of the wireless network?

    A. Upgrade the encryption to WPA or WPA2

    B. Create a non-zero length SSID for the wireless router

    C. Reroute wireless users to a honeypot

    D. Disable responses to a broadcast probe request

  • Question 324:

    Which of the following should be used to implement voice encryption?

    A. SSLv3

    B. VDSL

    C. SRTP

    D. VoIP

  • Question 325:

    During an application design, the development team specifics a LDAP module for single sign-on communication with the company's access control database. This is an example of which of the following?

    A. Application control

    B. Data in-transit

    C. Identification

    D. Authentication

  • Question 326:

    The data backup window has expanded into the morning hours and has begun to affect production users. The main bottleneck in the process is the time it takes to replicate the backups to separate severs at the offsite data center. Which of the following uses of deduplication could be implemented to reduce the backup window?

    A. Implement deduplication at the network level between the two locations

    B. Implement deduplication on the storage array to reduce the amount of drive space needed

    C. Implement deduplication on the server storage to reduce the data backed up

    D. Implement deduplication on both the local and remote servers

  • Question 327:

    A penetration testing is preparing for a client engagement in which the tester must provide data that proves and validates the scanning tools' results. Which of the following is the best method for collecting this information?

    A. Set up the scanning system's firewall to permit and log all outbound connections

    B. Use a protocol analyzer to log all pertinent network traffic

    C. Configure network flow data logging on all scanning system

    D. Enable debug level logging on the scanning system and all scanning tools used.

  • Question 328:

    Joe, a technician, is working remotely with his company provided laptop at the coffee shop near his home. Joe is concerned that another patron of the coffee shop may be trying to access his laptop. Which of the following is an appropriate control to use to prevent the other patron from accessing Joe's laptop directly?

    A. full-disk encryption

    B. Host-based firewall

    C. Current antivirus definitions

    D. Latest OS updates

  • Question 329:

    An attacker uses a network sniffer to capture the packets of a transaction that adds $20 to a gift card. The attacker then user a function of the sniffer to push those packets back onto the network again, adding another $20 to the gift card. This can be done many times. Which of the following describes this type of attack?

    A. Integer overflow attack

    B. Smurf attack

    C. Replay attack

    D. Buffer overflow attack

    E. Cross-site scripting attack

  • Question 330:

    An organization is moving its human resources system to a cloud services provider. The company plans to continue using internal usernames and passwords with the service provider, but the security manager does not want the service provider to have a company of the passwords. Which of the following options meets all of these requirements?

    A. Two-factor authentication

    B. Account and password synchronization

    C. Smartcards with PINS

    D. Federated authentication

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only CompTIA exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your RC0-501 exam preparations and CompTIA certification application, do not hesitate to visit our Vcedump.com to find your solutions here.