لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
DRAG DROP Given the graphic, match each stage of the cyber-attack lifecycle to its description.:
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #2
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
A. operating system patches
B. full-disk encryption
C. periodic data backups
D. endpoint-based firewall
عرض الإجابة
اجابة صحيحة: D
السؤال #3
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?
A. connectors and interfaces
B. infrastructure and containers
C. containers and developers
D. data center and UPS
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which type of malware takes advantage of a vulnerability on an endpoint or server?
A. technique
B. patch
C. vulnerability
D. exploit
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
A. User-ID
B. Device-ID
C. App-ID
D. Content-ID
عرض الإجابة
اجابة صحيحة: CDE
السؤال #6
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor. Which NIST cloud service model is this?
A. IaaS
B. SaaS
C. PaaS
D. CaaS
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which network analysis tool can be used to record packet captures?
A. Smart IP Scanner
B. Wireshark
C. Angry IP Scanner
D. Netman
عرض الإجابة
اجابة صحيحة: A
السؤال #8
What is a key advantage and key risk in using a public cloud environment?
A. Multi-tenancy
B. Dedicated Networks
C. Dedicated Hosts
D. Multiplexing
عرض الإجابة
اجابة صحيحة: A
السؤال #9
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
A. control and protect inter-host traffic using routers configured to use the Border Gateway Protocol (BGP) dynamic routing protocol
B. control and protect inter-host traffic by exporting all your traffic logs to a sysvol log server using the User Datagram Protocol (UDP)
C. control and protect inter-host traffic by using IPv4 addressing
D. control and protect inter-host traffic using physical network security appliances
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
A. Dynamic
B. Pre-exploit protection
C. Bare-metal
D. Static
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Given the graphic, match each stage of the cyber-attack lifecycle to its description.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #12
On an endpoint, which method should you use to secure applications against exploits?
A. endpoint-based firewall
B. strong user passwords
C. full-disk encryption
D. software patches
عرض الإجابة
اجابة صحيحة: C
السؤال #13
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
A. decrypt the infected file using base64
B. alert system administrators
C. quarantine the infected file
D. delete the infected file
E. remove the infected file’s extension
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which type of Wi-Fi attack depends on the victim initiating the connection?
A. Evil twin
B. Jasager
C. Parager
D. Mirai
عرض الإجابة
اجابة صحيحة: D
السؤال #15
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
A. Cortex XDR
B. AutoFocus
C. MineMild
D. Cortex XSOAR
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Which activities do local organization security policies cover for a SaaS application?
A. how the data is backed up in one or more locations
B. how the application can be used
C. how the application processes the data
D. how the application can transit the Internet
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: