لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A company has decided to purchase a license for software that is used to operate a mission-critical process. The third-party developer is new to the industry but is delivering what the company needs at this time. Which of the following BEST describes the reason why utilizing a source code escrow will reduce the operational risk to the company if the third party stops supporting the application?
A. The company will have access to the latest version to continue development
B. The company will be able to force the third-party developer to continue support
C. The company will be able to manage the third-party developer’s development process
D. The company will be paid by the third-party developer to hire a new development team
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A company that all mobile devices be encrypted, commensurate with the full disk encryption scheme of assets, such as workstation, servers, and laptops. Which of the following will MOST likely be a limiting factor when selecting mobile device managers for the company?
A. Increased network latency
B. Unavailable of key escrow
C. Inability to selected AES-256 encryption
D. Removal of user authentication requirements
عرض الإجابة
اجابة صحيحة: B
السؤال #3
A company’s claims processed department has a mobile workforce that receives a large number of email submissions from personal email addresses. An employees recently received an email that approved to be claim form, but it installed malicious software on the employee’s laptop when was opened.
A. Impalement application whitelisting and add only the email client to the whitelist for laptop in the claims processing department
B. Required all laptops to connect to the VPN before accessing email
C. Implement cloud-based content filtering with sandboxing capabilities
D. Install a mail gateway to scan incoming messages and strip attachments before they reach the mailbox
عرض الإجابة
اجابة صحيحة: D
السؤال #4
A SOC analyst is reviewing malicious activity on an external, exposed web server. During the investigation, the analyst determines specific traffic is not being logged, and there is no visibility from the WAF for the web application. Which of the following is the MOST likely cause?
A. The user agent client is not compatible with the WAF
B. A certificate on the WAF is expired
C. HTTP traffic is not forwarding to HTTPS to decrypt
D. Old, vulnerable cipher suites are still being used
عرض الإجابة
اجابة صحيحة: A
السؤال #5
An organization’s hunt team thinks a persistent threats exists and already has a foothold in the enterprise network. Which of the following techniques would be BEST for the hunt team to use to entice the adversary to uncover malicious activity?
A. Deploy a SOAR tool
B. Modify user password history and length requirements
C. Apply new isolation and segmentation schemes
D. Implement decoy files on adjacent hosts
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which of the following is a benefit of using steganalysis techniques in forensic response?
A. Breaking a symmetric cipher used in secure voice communications
B. Determining the frequency of unique attacks against DRM-protected media
C. Maintaining chain of custody for acquired evidence
D. Identifying least significant bit encoding of data in a
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A small company recently developed prototype technology for a military program. The company’s security engineer is concerned about potential theft of the newly developed, proprietary information. Which of the following should the security engineer do to BEST manage the threats proactively?
A. Join an information-sharing community that is relevant to the company
B. Leverage the MITRE ATT&CK framework to map the TTR
C. Use OSINT techniques to evaluate and analyze the threats
D. Update security awareness training to address new threats, such as best practices for data security
عرض الإجابة
اجابة صحيحة: C
السؤال #8
A security analyst is investigating a possible buffer overflow attack. The following output was found on a user’s workstation: graphic.linux_randomization.prg Which of the following technologies would mitigate the manipulation of memory segments?
A. NX bit
B. ASLR
C. DEP
D. HSM
عرض الإجابة
اجابة صحيحة: D
السؤال #9
An analyst execute a vulnerability scan against an internet-facing DNS server and receives the following report: Which of the following tools should the analyst use FIRST to validate the most critical vulnerability?
A. Password cracker
B. Port scanner
C. Account enumerator
D. Exploitation framework
عرض الإجابة
اجابة صحيحة: AB
السؤال #10
An organization recently started processing, transmitting, and storing its customers’ credit card information. Within a week of doing so, the organization suffered a massive breach that resulted in the exposure of the customers’ information. Which of the following provides the BEST guidance for protecting such information while it is at rest and in transit?
A. NIST
B. GDPR
C. PCI DSS
D. ISO
عرض الإجابة
اجابة صحيحة: C
السؤال #11
A developer implement the following code snippet. Which of the following vulnerabilities does the code snippet resolve?
A. SQL inject
B. Buffer overflow
C. Missing session limit
D. Information leakage
عرض الإجابة
اجابة صحيحة: AB
السؤال #12
A company publishes several APIs for customers and is required to use keys to segregate customer data sets. Which of the following would be BEST to use to store customer keys?
A. A trusted platform module
B. A hardware security module
C. A localized key store
D. A public key infrastructure
عرض الإجابة
اجابة صحيحة: C
السؤال #13
A business stores personal client data of individuals residing in the EU in order to process requests for mortgage loan approvals. Which of the following does the business’s IT manager need to consider?
A. The availability of personal data
B. The right to personal data erasure
C. The company’s annual revenue
D. The language of the web application
عرض الإجابة
اجابة صحيحة: D
السؤال #14
A satellite communications ISP frequently experiences outages and degraded modes of operation over one of its legacy satellite links due to the use of deprecated hardware and software. Three days per week, on average, a contracted company must follow a checklist of 16 different high-latency commands that must be run in serial to restore nominal performance. The ISP wants this process to be automated. Which of the following techniques would be BEST suited for this requirement?
A. Deploy SOAR utilities and runbooks
B. Replace the associated hardware
C. Provide the contractors with direct access to satellite telemetry data
D. Reduce link latency on the affected ground and satellite segments
عرض الإجابة
اجابة صحيحة: B
السؤال #15
A security engineer needs to recommend a solution that will meet the following requirements: Identify sensitive data in the provider’s network Maintain compliance with company and regulatory guidelines Detect and respond to insider threats, privileged user threats, and compromised accounts Enforce datacentric security, such as encryption, tokenization, and access control Which of the following solutions should the security engineer recommend to address these requirements?
A. WAF
B. CASB
C. SWG
D. DLP
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A security analyst receives an alert from the SIEM regarding unusual activity on an authorized public SSH jump server. To further investigate, the analyst pulls the event logs directly from /var/log/ auth.log: graphic.ssh_auth_log. Which of the following actions would BEST address the potential risks by the activity in the logs?
A. Alerting the misconfigured service account password
B. Modifying the AllowUsers configuration directive
C. Restricting external port 22 access
D. Implementing host-key preferences
عرض الإجابة
اجابة صحيحة: C
السؤال #17
An IT administrator is reviewing all the servers in an organization and notices that a server is missing crucial practice against a recent exploit that could gain root access. Which of the following describes the administrator’s discovery?
A. A vulnerability
B. A threat
C. A breach
D. A risk
عرض الإجابة
اجابة صحيحة: A
السؤال #18
A security analyst is investigating a series of suspicious emails by employees to the security team. The email appear to come from a current business partner and do not contain images or URLs. No images or URLs were stripped from the message by the security tools the company uses instead, the emails only include the following in plain text. Which of the following should the security analyst perform?
A. Contact the security department at the business partner and alert them to the email event
B. Block the IP address for the business partner at the perimeter firewall
C. Pull the devices of the affected employees from the network in case they are infected with a zero-day virus
D. Configure the email gateway to automatically quarantine all messages originating from the business partner
عرض الإجابة
اجابة صحيحة: C
السؤال #19
A company is looking to fortify its cybersecurity defenses and is focusing on its network infrastructure. The solution cannot affect the availability of the company’s services to ensure false positives do not drop legitimate traffic. Which of the following would satisfy the requirement?
A. NIDS
B. NIPS
C. WAF
D. Reverse proxy
عرض الإجابة
اجابة صحيحة: A
السؤال #20
An organization is implementing a new identity and access management architecture with the following objectives: Supporting MFA against on-premises infrastructure Improving the user experience by integrating with SaaS applications Applying risk-based policies based on location Performing just-in-time provisioning Which of the following authentication protocols should the organization implement to support these requirements?
A. Kerberos and TACACS
B. SAML and RADIUS
C. OAuth and OpenID
D. OTP and 802
عرض الإجابة
اجابة صحيحة: A
السؤال #21
A company has hired a security architect to address several service outages on the endpoints due to new malware. The Chief Executive Officer’s laptop was impacted while working from home. The goal is to prevent further endpoint disruption. The edge network is protected by a web proxy. Which of the following solutions should the security architect recommend?
A. Replace the current antivirus with an EDR solution
B. Remove the web proxy and install a UTM appliance
C. Implement a deny list feature on the endpoints
D. Add a firewall module on the current antivirus solution
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: