لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A security team is discussing lessons learned and suggesting process changes after a security breach incident. During theincident, members of the security team failed to report the abnormal system activity due to a high project workload.Additionally, when the incident was identified, the response took six hours due to management being unavailable to providethe approvals needed.Which two steps will prevent these issues from occurring in the future? (Choose two.)
A. Introduce a priority rating for incident response workloads
B. Provide phishing awareness training for the fill security team
C. Conduct a risk audit of the incident response workflow
D. Create an executive team delegation plan
E. Automate security alert timeframes with escalation triggers
عرض الإجابة
اجابة صحيحة: AE
السؤال #2
After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
A. ncapsulation
B. OP sled technique
C. ddress space randomization
D. eap-based security
E. ata execution prevention
عرض الإجابة
اجابة صحيحة: CE
السؤال #3
What do these artifacts indicate?
A. An executable file is requesting an application download
B. A malicious file is redirecting users to different domains
C. The MD5 of a file is identified as a virus and is being blocked
D. A forged DNS request is forwarding users to malicious websites
عرض الإجابة
اجابة صحيحة: A
السؤال #4
What should be determined from this Apache log?
A. module named mod_ssl is needed to make SSL connections
B. he private key does not match with the SSL certificate
C. he certificate file has been maliciously modified
D. he SSL traffic setup is improper
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A security team received an alert of suspicious activity on a users Internet browser. The users anti-virus software indicatedthat the file attempted to create a fake recycle bin folder and connect to an external IP address. Which two actions should betaken by the security analyst with the executable file for further analysis? (Choose two.)
A. Evaluate the process activity in Cisco Umbrella
B. Analyze the TCP/IP Streams in Cisco Secure Malware Analytics (Threat Grid)
C. Evaluate the behavioral indicators in Cisco Secure Malware Analytics (Threat Grid)
D. Analyze the Magic File type in Cisco Umbrella
E. Network Exit Localization in Cisco Secure Malware Analytics (Threat Grid)
عرض الإجابة
اجابة صحيحة: BC
السؤال #6
An unknown error code is appearing on an ESXi host during authentication. An engineer checks the authentication logs butis unable to identify the issue. Analysis of the vCenter agent logs shows no connectivity errors. What is the next log file theengineer should check to continue troubleshooting this error?
A. /var/log/syslog
B. /var/log/vmksummary
C. var/log/shell
D. var/log/general/log
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which type of code is being used?
A. Shell
B. VBScript
C. BASH
D. Python
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which tool conducts memory analysis?
A. MemDump
B. Sysinternals Autoruns
C. Volatility
D. Memoryze
عرض الإجابة
اجابة صحيحة: C
السؤال #9
An employee notices unexpected changes and setting modifications on their workstation and creates anincident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket wasescalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumpson network shares. What should be determined from this information?
A. data obfuscation
B. reconnaissance attack
C. brute-force attack
D. log tampering
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which two actions should be taken as a result of this information? (Choose two.)
A. Update the AV to block any file with hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”
B. Block all emails sent from an @state
C. Block all emails with pdf attachments
D. Block emails sent from [email protected] with an attached pdf file with md5 hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”
E. Block all emails with subject containing “cf2b3ad32a8a4cfb05e9dfc45875bd70”
عرض الإجابة
اجابة صحيحة: AB
السؤال #11
An organization recovered from a recent ransomware outbreak that resulted in significant business damage. Leadership requested a report that identifies the problems that triggered the incident and the security team's approach to address these problems to prevent a reoccurrence. Which components of the incident should an engineer analyze first for this report?
A. mpact and flow
B. ause and effect
C. isk and RPN
D. otive and factors
عرض الإجابة
اجابة صحيحة: D
السؤال #12
An engineer is investigating a ticket from the accounting department in which a user discovered an unexpected application on their workstation. Several alerts are seen from the intrusion detection system of unknown outgoing internet traffic from this workstation. The engineer also notices a degraded processing capability, which complicates the analysis process. Which two actions should the engineer take? (Choose two.)
A. Restore to a system recovery point
B. Replace the faulty CPU
C. Disconnect from the network
D. Format the workstation drives
E. Take an image of the workstation
عرض الإجابة
اجابة صحيحة: AE
السؤال #13
What is the IOC threat and URL in this STIX JSON snippet?
A. malware; ‘http://x4z9arb
B. malware; x4z9arb backdoor
C. x4z9arb backdoor; http://x4z9arb
D. malware; malware--162d917e-766f-4611-b5d6-652791454fca
E. stix; ‘http://x4z9arb
عرض الإجابة
اجابة صحيحة: D
السؤال #14
An organization recovered from a recent ransomware outbreak that resulted in significant business damage. Leadershiprequested a report that identifies the problems that triggered the incident and the security teams approach to address theseproblems to prevent a reoccurrence. Which components of the incident should an engineer analyze first for this report?
A. impact and flow
B. cause and effect
C. risk and RPN
D. motive and factors
عرض الإجابة
اجابة صحيحة: D
السؤال #15
An attacker embedded a macro within a word processing file opened by a user in an organizations legal department. Theattacker used this technique to gain access to confidential financial data. Which two recommendations should a securityexpert make to mitigate this type of attack? (Choose two.)
A. controlled folder access
B. removable device restrictions
C. signed macro requirements
D. firewall rules creation
E. network access control
عرض الإجابة
اجابة صحيحة: AC
السؤال #16
A network host is infected with malware by an attacker who uses the host to make calls for files and shuttle traffic to bots. This attack went undetected and resulted in a significant loss. The organization wants to ensure this does not happen in the future and needs a security solution that will generate alerts when command and control communication from an infected device is detected. Which network security solution should be recommended?
A. isco Secure Firewall ASA
B. isco Secure Firewall Threat Defense (Firepower)
C. isco Secure Email Gateway (ESA)
D. isco Secure Web Appliance (WSA)
عرض الإجابة
اجابة صحيحة: B
السؤال #17
An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment,which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewingrunning processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. Whatis the recommended action the engineer should take?
A. Upload the file signature to threat intelligence tools to determine if the file is malicious
B. Monitor processes as this a standard behavior of Word macro embedded documents
C. Contain the threat for further analysis as this is an indication of suspicious activity
D. Investigate the sender of the email and communicate with the employee to determine the motives
عرض الإجابة
اجابة صحيحة: A
السؤال #18
A network engineer is analyzing a Wireshark file to determine the HTTP request that caused the initialUrsnif banking Trojan binary to download. Which filter did the engineer apply to sort the Wireshark traffic logs?
A. http
B. tls
C. tcp
D. tcp
عرض الإجابة
اجابة صحيحة: B
السؤال #19
A security team is discussing lessons learned and suggesting process changes after a security breach incident. During the incident, members of the security team failed to report the abnormal system activity due to a high project workload. Additionally, when the incident was identified, the response took six hours due to management being unavailable to provide the approvals needed. Which two steps will prevent these issues from occurring in the future? (Choose two.)
A. Introduce a priority rating for incident response workloads
B. Provide phishing awareness training for the fill security team
C. Conduct a risk audit of the incident response workflow
D. Create an executive team delegation plan
E. Automate security alert timeframes with escalation triggers
عرض الإجابة
اجابة صحيحة: AE
السؤال #20
An engineer is investigating a ticket from the accounting department in which a user discovered an unexpected applicationon their workstation. Several alerts are seen from the intrusion detection system of unknown outgoing internet traffic fromthis workstation. The engineer also notices a degraded processing capability, which complicates the analysis process. Whichtwo actions should the engineer take? (Choose two.)
A. Restore to a system recovery point
B. Replace the faulty CPU
C. Disconnect from the network
D. Format the workstation drives
E. Take an image of the workstation
عرض الإجابة
اجابة صحيحة: AE
السؤال #21
An employee receives an email from a trusted person containing a hyperlink that is malvertising. The employee clicks thelink and the malware downloads. An information analyst observes an alert at the SIEM and engages the cybersecurity teamto conduct an analysis of this incident in accordance with the incident response plan. Which event detail should be includedin this root cause analysis?
A. phishing email sent to the victim
B. alarm raised by the SIEM
C. information from the email header
D. alert identified by the cybersecurity team
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: