لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Company.org has requested a black-box security assessment be performed on key cyber terrain. On area of concern is the company’s SMTP services. The security assessor wants to run reconnaissance before taking any additional action and wishes to determine which SMTP server is Internet-facing. Which of the following commands should the assessor use to determine this information?
A. dnsrecon –d company
B. dig company
C. nc –v company
D. whois company
عرض الإجابة
اجابة صحيحة: D
السؤال #2
A technician receives the following security alert from the firewall’s automated system: After reviewing the alert, which of the following is the BEST analysis?
A. This alert is false positive because DNS is a normal network function
B. This alert indicates a user was attempting to bypass security measures using dynamic DNS
C. This alert was generated by the SIEM because the user attempted too many invalid login attempts
D. This alert indicates an endpoint may be infected and is potentially contacting a suspect hos
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following technologies prevents an unauthorized HBA from viewing iSCSI target information?
A. Deduplication
B. Data snapshots
C. LUN masking
D. Storage multipaths
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A government organization operates and maintains several ICS environments. The categorization of one of the ICS environments led to a moderate baseline. The organization has complied a set of applicable security controls based on this categorization. Given that this is a unique environment, which of the following should the organization do NEXT to determine if other security controls should be considered?
A. Check for any relevant or required overlays
B. Review enhancements within the current control set
C. Modify to a high-baseline set of controls
D. Perform continuous monitorin
عرض الإجابة
اجابة صحيحة: B
السؤال #5
A database administrator is required to adhere to and implement privacy principles when executing daily tasks. A manager directs the administrator to reduce the number of unique instances of PII stored within an organization’s systems to the greatest extent possible. Which of the following principles is being demonstrated?
A. Administrator accountability
B. PII security
C. Record transparency
D. Data minimization
عرض الإجابة
اجابة صحيحة: A
السؤال #6
The security configuration management policy states that all patches must undergo testing procedures before being moved into production. The sec… analyst notices a single web application server has been downloading and applying patches during non-business hours without testing. There are no apparent adverse reaction, server functionality does not seem to be affected, and no malware was found after a scan. Which of the following action should the analyst take?
A. Reschedule the automated patching to occur during business hours
B. Monitor the web application service for abnormal bandwidth consumption
C. Create an incident ticket for anomalous activity
D. Monitor the web application for service interruptions caused from the patchin
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A pharmacy gives its clients online access to their records and the ability to review bills and make payments. A new SSL vulnerability on a specific platform was discovered, allowing an attacker to capture the data between the end user and the web server providing these services. After the new vulnerability, it was determined that web services provided are being impacted by this new threat. Which of the following data types MOST likely at risk of exposure based on this new threat? (Select Two)
A. Cardholder data
B. Intellectual property
C. Personal health information
D. Employee records
E. Corporate financial data
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: