لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A company’s existing forward proxies support software-based TLS decryption, but are currently at 60% load just dealing with AV scanning and content analysis for HTTP traffic. More than 70% outbound web traffic is currently encrypted. The switching and routing network infrastructure precludes adding capacity, preventing the installation of a dedicated TLS decryption system. The network firewall infrastructure is currently at 30% load and has software decryption modules that can be activated by purchasing add
A. Purchase the SSL, decryption license for the firewalls and route traffic back to the proxies for end-user categorization and malware analysis
B. Roll out application whitelisting to end-user desktops and decommission the existing proxies, freeing up network ports
C. Use an EDP solution to address the malware issue and accept the diminishing role of the proxy for URL categorization in the short team
D. Accept the current risk and seek possible funding approval in the next budget cycle to replace the existing proxies with ones with more capacity
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A security researcher is gathering information about a recent spoke in the number of targeted attacks against multinational banks. The spike is on top of already sustained attacks against the banks. Some of the previous attacks have resulted in the loss of sensitive data, but as of yet the attackers have not successfully stolen any funds. Based on the information available to the researcher, which of the following is the MOST likely threat profile?
A. Nation-state-sponsored attackers conducting espionage for strategic gain
B. Insiders seeking to gain access to funds for illicit purposes
C. Opportunists seeking notoriety and fame for personal gain
D. Hacktivists seeking to make a political statement because of socio-economic factors
عرض الإجابة
اجابة صحيحة: D
السؤال #3
An information security officer is responsible for one secure network and one office network. Recent intelligence suggests there is an opportunity for attackers to gain access to the secure network due to similar login credentials across networks. To determine the users who should change their information, the information security officer uses a tool to scan a file with hashed values on both networks and receives the following data: Which of the following tools was used to gather this information from the h
A. Vulnerability scanner
B. Fuzzer
C. MD5 generator
D. Password cracker
E. Protocol analyzer
عرض الإجابة
اجابة صحيحة: D
السؤال #4
A security analyst is inspecting pseudocode of the following multithreaded application: Which of the following security concerns is evident in the above pseudocode?
A. Time of check/time of use
B. Resource exhaustion
C. Improper storage of sensitive data
D. Privilege escalation
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A security administrator wants to implement two-factor authentication for network switches and routers. The solution should integrate with the company’s RADIUS server, which is used for authentication to the network infrastructure devices. The security administrator implements the following: An HOTP service is installed on the RADIUS server. The RADIUS server is configured to require the HOTP service for authentication. The configuration is successfully tested using a software supplicant and enforced across
A. Replace the password requirement with the second factor
B. Configure the RADIUS server to accept the second factor appended to the password
C. Reconfigure network devices to prompt for username, password, and a token
D. Install a TOTP service on the RADIUS server in addition to the HOTP service
عرض الإجابة
اجابة صحيحة: B
السؤال #6
A systems administrator recently joined an organization and has been asked to perform a security assessment of controls on the organization’s file servers, which contain client data from a number of sensitive systems. The administrator needs to compare documented access requirements to the access implemented within the file system. Which of the following is MOST likely to be reviewed during the assessment? (Select two.)
A. Access control list
B. Security requirements traceability matrix
C. Data owner matrix
D. Roles matrix
E. Data design document
F. Data access policies
عرض الإجابة
اجابة صحيحة: AF
السؤال #7
A security architect is determining the best solution for a new project. The project is developing a new intranet with advanced authentication capabilities, SSO for users, and automated provisioning to streamline Day 1 access to systems. The security architect has identified the following requirements: 1. Information should be sourced from the trusted master data source. 2. There must be future requirements for identity proofing of devices and users. 3. A generic identity connector that can be reused must b
A. LDAP, multifactor authentication, OAuth, XACML
B. AD, certificate-based authentication, Kerberos, SPML
C. SAML, context-aware authentication, OAuth, WAYF
D. NAC, radius, 802
عرض الإجابة
اجابة صحيحة: B
السؤال #8
An organization is considering the use of a thin client architecture as it moves to a cloud-hosted environment. A security analyst is asked to provide thoughts on the security advantages of using thin clients and virtual workstations. Which of the following are security advantages of the use of this combination of thin clients and virtual workstations?
A. Malicious insiders will not have the opportunity to tamper with data at rest and affect the integrity of the system
B. Thin client workstations require much less security because they lack storage and peripherals that can be easily compromised, and the virtual workstations are protected in the cloud where security is outsourced
C. All thin clients use TPM for core protection, and virtual workstations use vTPM for core protection with both equally ensuring a greater security advantage for a cloud-hosted environment
D. Malicious users will have reduced opportunities for data extractions from their physical thin client workstations, this reducing the effectiveness of local attacks
عرض الإجابة
اجابة صحيحة: B
السؤال #9
The Chief Information Officer (CIO) wants to increase security and accessibility among the organization’s cloud SaaS applications. The applications are configured to use passwords, and two-factor authentication is not provided natively. Which of the following would BEST address the CIO’s concerns?
A. Procure a password manager for the employees to use with the cloud applications
B. Create a VPN tunnel between the on-premises environment and the cloud providers
C. Deploy applications internally and migrate away from SaaS applications
D. Implement an IdP that supports SAML and time-based, one-time passwords
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Given the following output from a security tool in Kali:
A. Log reduction
B. Network enumerator
C. Fuzzer
D. SCAP scanner
عرض الإجابة
اجابة صحيحة: C
السؤال #11
A government organization operates and maintains several ICS environments. The categorization of one of the ICS environments led to a moderate baseline. The organization has complied a set of applicable security controls based on this categorization. Given that this is a unique environment, which of the following should the organization do NEXT to determine if other security controls should be considered?
A. Check for any relevant or required overlays
B. Review enhancements within the current control set
C. Modify to a high-baseline set of controls
D. Perform continuous monitoring
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which of the following is an external pressure that causes companies to hire security assessors and penetration testers?
A. Lack of adequate in-house testing skills
B. Requirements for geographically based assessments
C. Cost reduction measures
D. Regulatory insistence on independent reviews
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Given the following information about a company’s internal network: User IP space: 192.168.1.0/24 Server IP space: 192.168.192.0/25 A security engineer has been told that there are rogue websites hosted outside of the proper server space, and those websites need to be identified. Which of the following should the engineer do?
A. Use a protocol analyzer on 192
B. Use a port scanner on 192
C. Use an HTTP interceptor on 192
D. Use a port scanner on 192
E. Use a protocol analyzer on 192
F. Use an HTTP interceptor on 192
عرض الإجابة
اجابة صحيحة: B
السؤال #14
SIMULATION As a security administrator, you are asked to harden a server running Red Hat Enterprise Server 5.5 64-bit. This server is being used as a DNS and time server. It is not used as a database, web server, or print server. There are no wireless connections to the server, and it does not need to print. The command window will be provided along with root access. You are connected via a secure shell with root access. You may query help for a list of commands. Instructions: You need to disable and turn o
SIMULATION As a security administrator, you are asked to harden a server running Red Hat Enterprise Server 5. 64-bit
عرض الإجابة
اجابة صحيحة: S
السؤال #15
A company contracts a security engineer to perform a penetration test of its client-facing web portal. Which of the following activities would be MOST appropriate?
A. Use a protocol analyzer against the site to see if data input can be replayed from the browser
B. Scan the website through an interception proxy and identify areas for the code injection
C. Scan the site with a port scanner to identify vulnerable services running on the web server
D. Use network enumeration tools to identify if the server is running behind a load balancer
عرض الإجابة
اجابة صحيحة: C
السؤال #16
During a security assessment, activities were divided into two phases; internal and external exploitation. The security assessment team set a hard time limit on external activities before moving to a compromised box within the enterprise perimeter. Which of the following methods is the assessment team most likely to employ NEXT?
A. Pivoting from the compromised, moving laterally through the enterprise, and trying to exfiltrate data and compromise devices
B. Conducting a social engineering attack attempt with the goal of accessing the compromised box physically
C. Exfiltrating network scans from the compromised box as a precursor to social media reconnaissance
D. Open-source intelligence gathering to identify the network perimeter and scope to enable further system compromises
عرض الإجابة
اجابة صحيحة: A
السؤال #17
To meet an SLA, which of the following document should be drafted, defining the company’s internal interdependent unit responsibilities and delivery timelines.
A. BPA
B. OLA
C. MSA
D. MOU
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Given the following code snippet: Which of the following failure modes would the code exhibit?
A. Open
B. Secure
C. Halt
D. Exception
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: