لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which regular expression matches "color" and "colour"?
A. colo?ur
B. col[08]+our
C. colou?r
D. col[09]+our
عرض الإجابة
اجابة صحيحة: D
السؤال #2
A SOC analyst is investigating an incident that involves a Linux system that is identifying specific sessions. Which identifier tracks an active program?
A. application identification number
B. active process identification number
C. runtime identification number
D. process identification number
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which evasion technique is a function of ransomware?
A. extended sleep calls
B. encryption
C. resource exhaustion
D. encoding
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which two elements are assets in the role of attribution in an investigation? (Choose two.)
A. context
B. session
C. laptop
D. firewall logs
E. threat actor
عرض الإجابة
اجابة صحيحة: AE
السؤال #5
Why is encryption challenging to security monitoring?
A. Encryption analysis is used by attackers to monitor VPN tunnels
B. Encryption is used by threat actors as a method of evasion and obfuscation
C. Encryption introduces additional processing requirements by the CPU
D. Encryption introduces larger packet sizes to analyze and store
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Which packet contains a file that is extractable within Wireshark?
A. 2317
B. 1986
C. 2318
D. 2542
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Which action prevents buffer overflow attacks?
A. variable randomization
B. using web based applications
C. input sanitization
D. using a Linux operating system
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which event is user interaction?
A. gaining root access
B. executing remote code
C. reading and writing file permission
D. opening a malicious file
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which system monitors local system operation and local network access for violations of a security policy?
A. host-based intrusion detection
B. systems-based sandboxing
C. host-based firewall
D. antivirus
عرض الإجابة
اجابة صحيحة: A
السؤال #10
An offline audit log contains the source IP address of a session suspected to have exploited a vulnerability resulting in system compromise. Which kind of evidence is this IP address?
A. best evidence
B. corroborative evidence
C. indirect evidence
D. forensic evidence
عرض الإجابة
اجابة صحيحة: C
السؤال #11
What is the function of a command and control server?
A. It enumerates open ports on a network device
B. It drops secondary payload into malware
C. It is used to regain control of the network after a compromise
D. It sends instruction to a compromised system
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Drag and drop the technology on the left onto the data type the technology provides on the right.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: B
السؤال #13
During which phase of the forensic process is data that is related to a specific event labeled and recorded to preserve its integrity?
A. examination
B. investigation
C. collection
D. reporting
عرض الإجابة
اجابة صحيحة: C
السؤال #14
What is an example of social engineering attacks?
A. receiving an unexpected email from an unknown person with an uncharacteristic attachment from someone in the same company
B. receiving an email from human resources requesting a visit to their secure website to update contact information
C. sending a verbal request to an administrator who knows how to change an account password
D. receiving an invitation to the department’s weekly WebEx meeting
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which two compliance frameworks require that data be encrypted when it is transmitted over a public network? (Choose two.)
A. PCI
B. GLBA
C. HIPAA
D. SOX
E. COBIT
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which event artifact is used to identity HTTP GET requests for a specific file?
A. destination IP address
B. TCP ACK
C. HTTP status code
D. URI
عرض الإجابة
اجابة صحيحة: C
السؤال #17
This request was sent to a web application server driven by a database. Which type of web server attack is represented?
A. parameter manipulation
B. heap memory corruption
C. command injection
D. blind SQL injection
عرض الإجابة
اجابة صحيحة: D
السؤال #18
How does an SSL certificate impact security between the client and the server?
A. by enabling an authenticated channel between the client and the server
B. by creating an integrated channel between the client and the server
C. by enabling an authorized channel between the client and the server
D. by creating an encrypted channel between the client and the server
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: