لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A threat advisory alert was just emailed to the IT security staff. The alert references specific types of host operating systems that can allow an unauthorized person to access files on a system remotely. A fix was recently published, but it requires a recent endpoint protection engine to be installed prior to running the fix. Which of the following MOST likely need to be configured to ensure the system are mitigated accordingly? (Choose two.)
A. Antivirus
B. HIPS
C. Application whitelisting
D. Patch management
E. Group policy implementation
F. Firmware updates
عرض الإجابة
اجابة صحيحة: AD
السؤال #2
A security architect is determining the best solution for a new project. The project is developing a new intranet with advanced authentication capabilities, SSO for users, and automated provisioning to streamline Day 1 access to systems. The security architect has identified the following requirements: 1. Information should be sourced from the trusted master data source. 2. There must be future requirements for identity proofing of devices and users. 3. A generic identity connector that can be reused must
A. LDAP, multifactor authentication, OAuth, XACML
B. AD, certificate-based authentication, Kerberos, SPML
C. SAML, context-aware authentication, OAuth, WAYF
D. NAC, radius, 802
عرض الإجابة
اجابة صحيحة: B
السؤال #3
An organization’s network engineering team recently deployed a new software encryption solution to ensure the confidentiality of data at rest, which was found to add 300ms of latency to data read-write requests in storage, impacting business operations. Which of the following alternative approaches would BEST address performance requirements while meeting the intended security objective?
A. Employ hardware FDE or SED solutions
B. Utilize a more efficient cryptographic hash function
C. Replace HDDs with SSD arrays
D. Use a FIFO pipe a multithreaded software solution
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Given the code snippet below: Which of the following vulnerability types in the MOST concerning?
A. Only short usernames are supported, which could result in brute forcing of credentials
B. Buffer overflow in the username parameter could lead to a memory corruption vulnerability
C. Hardcoded usernames with different code paths taken depend on which user is entered
D. Format string vulnerability is present for admin users but not for standard users
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Engineers at a company believe a certain type of data should be protected from competitors, but the data owner insists the information is not sensitive. An information security engineer is implementing controls to secure the corporate SAN. The controls require dividing data into four groups: non-sensitive, sensitive but accessible, sensitive but export-controlled, and extremely sensitive. Which of the following actions should the engineer take regarding the data?
A. Label the data as extremely sensitive
B. Label the data as sensitive but accessible
C. Label the data as non-sensitive
D. Label the data as sensitive but export-controlled
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A network engineer is attempting to design-in resiliency characteristics for an enterprise network’s VPN services. If the engineer wants to help ensure some resilience against zero-day vulnerabilities exploited against the VPN implementation, which of the following decisions would BEST support this objective?
A. Implement a reverse proxy for VPN traffic that is defended and monitored by the organization’s SOC with near-real-time alerting to administrators
B. Subscribe to a managed service provider capable of supporting the mitigation of advanced DDoS attacks on the enterprise’s pool of VPN concentrators
C. Distribute the VPN concentrators across multiple systems at different physical sites to ensure some backup services are available in the event of primary site loss
D. Employ a second VPN layer concurrently where the other layer’s cryptographic implementation is sourced from a different vendor
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A breach was caused by an insider threat in which customer PII was compromised. Following the breach, a lead security analyst is asked to determine which vulnerabilities the attacker used to access company resources. Which of the following should the analyst use to remediate the vulnerabilities?
A. Protocol analyzer
B. Root cause analysis
C. Behavioral analytics
D. Data leak prevention
عرض الإجابة
اجابة صحيحة: D
السؤال #8
A company contracts a security engineer to perform a penetration test of its client-facing web portal. Which of the following activities would be MOST appropriate?
A. Use a protocol analyzer against the site to see if data input can be replayed from the browser
B. Scan the website through an interception proxy and identify areas for the code injection
C. Scan the site with a port scanner to identify vulnerable services running on the web server
D. Use network enumeration tools to identify if the server is running behind a load balancer
عرض الإجابة
اجابة صحيحة: C
السؤال #9
The marketing department has developed a new marketing campaign involving significant social media outreach. The campaign includes allowing employees and customers to submit blog posts and pictures of their day-to-day experiences at the company. The information security manager has been asked to provide an informative letter to all participants regarding the security risks and how to avoid privacy and operational security issues. Which of the following is the MOST important information to reference in the l
A. After-action reports from prior incidents
B. Social engineering techniques
C. Company policies and employee NDAs
D. Data classification processes
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Company.org has requested a black-box security assessment be performed on key cyber terrain. One area of concern is the company’s SMTP services. The security assessor wants to run reconnaissance before taking any additional action and wishes to determine which SMTP server is Internet-facing. Which of the following commands should the assessor use to determine this information?
A. dnsrecon –d company
B. dig company
C. nc –v company
D. whois company
عرض الإجابة
اجابة صحيحة: A
السؤال #11
An organization has established the following controls matrix: The following control sets have been defined by the organization and are applied in aggregate fashion: Systems containing PII are protected with the minimum control set. Systems containing medical data are protected at the moderate level. Systems containing cardholder data are protected at the high level. The organization is preparing to deploy a system that protects the confidentially of a database containing PII and medical data from clients.
A. Proximity card access to the server room, context-based authentication, UPS, and full-disk encryption for the database server
B. Cipher lock on the server room door, FDE, surge protector, and static analysis of all application code
C. Peer review of all application changes, static analysis of application code, UPS, and penetration testing of the complete system
D. Intrusion detection capabilities, network-based IPS, generator, and context-based authentication
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A recent CRM upgrade at a branch office was completed after the desired deadline. Several technical issues were found during the upgrade and need to be discussed in depth before the next branch office is upgraded. Which of the following should be used to identify weak processes and other vulnerabilities?
A. Gap analysis
B. Benchmarks and baseline results
C. Risk assessment
D. Lessons learned report
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Security policies that are in place at an organization prohibit USB drives from being utilized across the entire enterprise, with adequate technical controls in place to block them. As a way to still be able to work from various locations on different computing resources, several sales staff members have signed up for a web-based storage solution without the consent of the IT department. However, the operations department is required to use the same service to transmit certain business partner documents. W
A. Enabling AAA
B. Deploying a CASB
C. Configuring an NGFW
D. Installing a WAF
E. Utilizing a vTPM
عرض الإجابة
اجابة صحيحة: B
السؤال #14
A security researcher is gathering information about a recent spoke in the number of targeted attacks against multinational banks. The spike is on top of already sustained attacks against the banks. Some of the previous attacks have resulted in the loss of sensitive data, but as of yet the attackers have not successfully stolen any funds. Based on the information available to the researcher, which of the following is the MOST likely threat profile?
A. Nation-state-sponsored attackers conducting espionage for strategic gain
B. Insiders seeking to gain access to funds for illicit purposes
C. Opportunists seeking notoriety and fame for personal gain
D. Hacktivists seeking to make a political statement because of socio-economic factors
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Following a merger, the number of remote sites for a company has doubled to 52. The company has decided to secure each remote site with an NGFW to provide web filtering, NIDS/NIPS, and network antivirus. The Chief Information Officer (CIO) has requested that the security engineer provide recommendations on sizing for the firewall with the requirements that it be easy to manage and provide capacity for growth. The tables below provide information on a subset of remote sites and the firewall options: Which o
A. Vendor C for small remote sites, and Vendor B for large sites
B. Vendor B for all remote sites
C. Vendor C for all remote sites
D. Vendor A for all remote sites
E. Vendor D for all remote sites
عرض الإجابة
اجابة صحيحة: D
السؤال #16
During a security assessment, activities were divided into two phases: internal and external exploitation. The security assessment team set a hard time limit on external activities before moving to a compromised box within the enterprise perimeter. Which of the following methods is the assessment team most likely to employ NEXT?
A. Pivoting from the compromised, moving laterally through the enterprise, and trying to exfiltrate data and compromise devices
B. Conducting a social engineering attack attempt with the goal of accessing the compromised box physically
C. Exfiltrating network scans from the compromised box as a precursor to social media reconnaissance
D. Open-source intelligence gathering to identify the network perimeter and scope to enable further system compromises
عرض الإجابة
اجابة صحيحة: A
السؤال #17
The legal department has required that all traffic to and from a company’s cloud-based word processing and email system is logged. To meet this requirement, the Chief Information Security Officer (CISO) has implemented a next-generation firewall to perform inspection of the secure traffic and has decided to use a cloudbased log aggregation solution for all traffic that is logged. Which of the following presents a long-term risk to user privacy in this scenario?
A. Confidential or sensitive documents are inspected by the firewall before being logged
B. Latency when viewing videos and other online content may increase
C. Reports generated from the firewall will take longer to produce due to more information from inspected traffic
D. Stored logs may contain non-encrypted usernames and passwords for personal websites
عرض الإجابة
اجابة صحيحة: A
السؤال #18
A company wants to extend its help desk availability beyond business hours. The Chief Information Officer (CIO) decides to augment the help desk with a thirdparty service that will answer calls and provide Tier 1 problem resolution, such as password resets and remote assistance. The security administrator implements the following firewall change: The administrator provides the appropriate path and credentials to the third-party company. Which of the following technologies is MOST likely being used to provi
A. LDAP
B. WAYF
C. OpenID
D. RADIUS
E. SAML
عرض الإجابة
اجابة صحيحة: D
السؤال #19
A penetration tester noticed special characters in a database table. The penetration tester configured the browser to use an HTTP interceptor to verify that the frontend user registration web form accepts invalid input in the user’s age field. The developer was notified and asked to fix the issue. Which of the following is the MOST secure solution for the developer to implement?
A. IF $AGE == “!@#$%^&*()_+<>?”:{}[]” THEN ERROR
B. IF $AGE == [1234567890] {1,3} THEN CONTINUE
C. IF $AGE != “a-bA-Z!@#$%^&*()_+<>?”:{}[]” THEN CONTINUE
D. IF $AGE == [1-0] {0,2} THEN CONTINUE
عرض الإجابة
اجابة صحيحة: B
السؤال #20
The Chief Information Officer (CISO) is concerned that certain systems administrators will privileged access may be reading other users’ emails. Review of a tool’s output shows the administrators have used web mail to log into other users’ inboxes. Which of the following tools would show this type of output?
A. Log analysis tool
B. Password cracker
C. Command-line tool
D. File integrity monitoring tool
عرض الإجابة
اجابة صحيحة: A
السؤال #21
A security engineer is embedded with a development team to ensure security is built into products being developed. The security engineer wants to ensure developers are not blocked by a large number of security requirements applied at specific schedule points. Which of the following solutions BEST meets the engineer’s goal?
A. Schedule weekly reviews of al unit test results with the entire development team and follow up between meetings with surprise code inspections
B. Develop and implement a set of automated security tests to be installed on each development team leader’s workstation
C. Enforce code quality and reuse standards into the requirements definition phase of the waterfall development process
D. Deploy an integrated software tool that builds and tests each portion of code committed by developers and provides feedback
عرض الإجابة
اجابة صحيحة: C
السؤال #22
Due to a recent breach, the Chief Executive Officer (CEO) has requested the following activities be conducted during incident response planning: Involve business owners and stakeholders Create an applicable scenario Conduct a biannual verbal review of the incident response plan Report on the lessons learned and gaps identified Which of the following exercises has the CEO requested?
A. Parallel operations
B. Full transition
C. Internal review
D. Tabletop
E. Partial simulation
عرض الإجابة
اجابة صحيحة: D
السؤال #23
A software development manager is running a project using agile development methods. The company cybersecurity engineer has noticed a high number of vulnerabilities have been making it into production code on the project. Which of the following methods could be used in addition to an integrated development environment to reduce the severity of the issue?
A. Conduct a penetration test on each function as it is developed
B. Develop a set of basic checks for common coding errors
C. Adopt a waterfall method of software development
D. Implement unit tests that incorporate static code analyzers
عرض الإجابة
اجابة صحيحة: D
السؤال #24
A government organization operates and maintains several ICS environments. The categorization of one of the ICS environments led to a moderate baseline. The organization has complied a set of applicable security controls based on this categorization. Given that this is a unique environment, which of the following should the organization do NEXT to determine if other security controls should be considered?
A. Check for any relevant or required overlays
B. Review enhancements within the current control set
C. Modify to a high-baseline set of controls
D. Perform continuous monitoring
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: