لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A security engineer needs to implement a solution to increase the security posture of user endpoints by providing more visibility and control over local administrator accounts. The endpoint security team is overwhelmed with alerts and wants a solution that has minimal operational burdens. Additionally, the solution must maintain a positive user experience after implementation. Which of the following is the BEST solution to meet these objectives?
A. Implement Privileged Access Management (PAM), keep users in the local administrators group, and enable local administrator account monitoring
B. Implement PAM, remove users from the local administrators group, and prompt users for explicit approval when elevated privileges are required
C. Implement EDR, remove users from the local administrators group, and enable privilege escalation monitoring
D. Implement EDR, keep users in the local administrators group, and enable user behavior analytics
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A company is repeatedly being breached by hackers who valid credentials. The company’s Chief information Security Officer (CISO) has installed multiple controls for authenticating users, including biometric and token-based factors. Each successive control has increased overhead and complexity but has failed to stop further breaches. An external consultant is evaluating the process currently in place to support the authentication controls . Which of the following recommendation would MOST likely reduce the r
A. Implement strict three-factor authentication
B. Implement least privilege policies
C. Switch to one-time or all user authorizations
D. Strengthen identify-proofing procedures
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A security analyst discovered that the company’s WAF was not properly configured. The main web server was breached, and the following payload was found in one of the malicious requests: Which of the following would BEST mitigate this vulnerability?
A. CAPTCHA
B. Input validation
C. Data encoding
D. Network intrusion prevention
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which of the following allows computation and analysis of data within a ciphertext without knowledge of the plaintext?
A. Lattice-based cryptography
B. Quantum computing
C. Asymmetric cryptography
D. Homomorphic encryption
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which of the following is required for an organization to meet the ISO 27018 standard?
A. All PII must be encrypted
B. All network traffic must be inspected
C. GDPR equivalent standards must be met
D. COBIT equivalent standards must be met
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Device event logs sources from MDM software as follows: Which of the following security concerns and response actions would BEST address the risks posed by the device in the logs?
A. Malicious installation of an application; change the MDM configuration to remove application ID 1220
B. Resource leak; recover the device for analysis and clean up the local storage
C. Impossible travel; disable the device’s account and access while investigating
D. Falsified status reporting; remotely wipe the device
عرض الإجابة
اجابة صحيحة: B
السؤال #7
A small business requires a low-cost approach to theft detection for the audio recordings it produces and sells. Which of the following techniques will MOST likely meet the business’s needs?
A. Performing deep-packet inspection of all digital audio files
B. Adding identifying filesystem metadata to the digital audio files
C. Implementing steganography
D. Purchasing and installing a DRM suite
عرض الإجابة
اجابة صحيحة: B
السؤال #8
A security analyst is evaluating the security of an online customer banking system. The analyst has a 12-character password for the test account. At the login screen, the analyst is asked to enter the third, eighth, and eleventh characters of the password. Which of the following describes why this request is a security concern? (Choose two.)
A. The request is evidence that the password is more open to being captured via a keylogger
B. The request proves that salt has not been added to the password hash, thus making it vulnerable to rainbow tables
C. The request proves the password is encoded rather than encrypted and thus less secure as it can be easily reversed
D. The request proves a potential attacker only needs to be able to guess or brute force three characters rather than 12 characters of the password
E. The request proves the password is stored in a reversible format, making it readable by anyone at the bank who is given access
F. The request proves the password must be in cleartext during transit, making it open to on-path attacks
عرض الإجابة
اجابة صحيحة: DE
السؤال #9
A company is preparing to deploy a global service. Which of the following must the company do to ensure GDPR compliance? (Choose two.)
A. Inform users regarding what data is stored
B. Provide opt-in/out for marketing messages
C. Provide data deletion capabilities
D. Provide optional data encryption
E. Grant data access to third parties
F. Provide alternative authentication techniques
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Company A is establishing a contractual with Company
B. The terms of the agreement are formalized in a document covering the payment terms, limitation of liability, and intellectual property rights
A. Company A-B SLA v2
B. Company A OLA v1b
C. Company A MSA v3
D. Company A MOU v1
E. Company A-B NDA v03
عرض الإجابة
اجابة صحيحة: A
السؤال #11
A systems administrator is in the process of hardening the host systems before connecting to the network. The administrator wants to add protection to the boot loader to ensure the hosts are secure before the OS fully boots. Which of the following would provide the BEST boot loader protection?
A. TPM
B. HSM
C. PKI
D. UEFI/BIOS
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A customer reports being unable to connect to a website at www.test.com to consume services. The customer notices the web application has the following published cipher suite: Which of the following is the MOST likely cause of the customer’s inability to connect?
A. Weak ciphers are being used
B. The public key should be using ECDSA
C. The default should be on port 80
D. The server name should be test
عرض الإجابة
اجابة صحيحة: B
السؤال #13
An application developer is including third-party background security fixes in an application. The fixes seem to resolve a currently identified security issue. However, when the application is released to the public, report come In that a previously vulnerability has returned . Which of the following should the developer integrate into the process to BEST prevent this type of behavior?
A. Peer review
B. Regression testing
C. User acceptance
D. Dynamic analysis
عرض الإجابة
اجابة صحيحة: C
السؤال #14
An organization recently experienced a ransomware attack. The security team leader is concerned about the attack reoccurring. However, no further security measures have been implemented. Which of the following processes can be used to identify potential prevention recommendations?
A. Detection
B. Remediation
C. Preparation
D. Recovery
عرض الإجابة
اجابة صحيحة: A
السؤال #15
An organization is moving its intellectual property data from on premises to a CSP and wants to secure the data from theft. Which of the following can be used to mitigate this risk?
A. An additional layer of encryption
B. A third-party, data integrity monitoring solution
C. A complete backup that is created before moving the data
D. Additional application firewall rules specific to the migration
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A security architect is reviewing the following proposed corporate firewall architecture and configuration:Both firewalls are stateful and provide Layer 7 filtering and routing. The company has the following requirements: Web servers must receive all updates via HTTP/S from the corporate network.Web servers should not initiate communication with the Internet. Web servers should only connect to preapproved corporate database servers. Employees' computing devices should only connect to web services over ports
A. Add the following to Firewall_A: 15 PERMIT FROM 10
B. Add the following to Firewall_A: 15 PERMIT FROM 192
C. Add the following to Firewall_A: 15 PERMIT FROM 10
D. Add the following to Firewall_B: 15 PERMIT FROM 0
E. Add the following to Firewall_B: 15 PERMIT FROM 10
F. Add the following to Firewall_B: 15 PERMIT FROM 192
عرض الإجابة
اجابة صحيحة: BD
السؤال #17
A pharmaceutical company was recently compromised by ransomware. Given the following EDR output from the process investigation:On which of the following devices and processes did the ransomware originate?
A. cpt-ws018, powershell
B. cpt-ws026, DearCry
C. cpt-ws002, NO-AV
D. cpt-ws026, NO-AV
E. cpt-ws002, DearCry
عرض الإجابة
اجابة صحيحة: C
السؤال #18
A company hired a third party to develop software as part of its strategy to be quicker to market. The company’s policy outlines the following requirements: The credentials used to publish production software to the container registry should be stored in a secure location. Access should be restricted to the pipeline service account, without the ability for the third-party developer to read the credentials directly. Which of the following would be the BEST recommendation for storing and monitoring access to
A. TPM
B. Local secure password file
C. MFA
D. Key vault
عرض الإجابة
اجابة صحيحة: A
السؤال #19
An organization wants to perform a scan of all its systems against best practice security configurations. Which of the following SCAP standards, when combined, will enable the organization to view each of the configuration checks in a machine-readable checklist format for fill automation? (Choose two.)
A. ARF
B. XCCDF
C. CPE
D. CVE
E. CVSS
F. OVAL
عرض الإجابة
اجابة صحيحة: C
السؤال #20
A third-party organization has implemented a system that allows it to analyze customers data and deliver analysis results without being able to see the raw data. Which of the following is the organization implementing?
A. Asynchronous keys
B. Homomorphic encryption
C. Data lake
D. Machine learning
عرض الإجابة
اجابة صحيحة: B
السؤال #21
A security manager wants to transition the organization to a zero trust architecture. To meet this requirement, the security manager has instructed administrators to remove trusted zones, role-based access, and one-time authentication. Which of the following will need to be implemented to achieve this objective? (Choose three.)
A. Least privilege
B. VPN
C. Policy automation
D. PKI
E. Firewall
F. Continuous validation
G. Continuous integration
H. IaaS
عرض الإجابة
اجابة صحيحة: ABD
السؤال #22
A junior developer is informed about the impact of new malware on an Advanced RISC Machine (ARM) CPU, and the code must be fixed accordingly. Based on the debug, the malware is able to insert itself in another process memory location. Which of the following technologies can the developer enable on the ARM architecture to prevent this type of malware?
A. Execute never
B. No-execute
C. Total memory encryption
D. Virtual memory encryption
عرض الإجابة
اجابة صحيحة: C
السؤال #23
Clients are reporting slowness when attempting to access a series of load-balanced APIs that do not require authentication. The servers that host the APIs are showing heavy CPU utilization. No alerts are found on the WAFs sitting in front of the APIs. Which of the following should a security engineer recommend to BEST remedy the performance issues in a timely manner?
A. Implement rate limiting on the API
B. Implement geoblocking on the WAF
C. Implement OAuth 2
D. Implement input validation on the API
عرض الإجابة
اجابة صحيحة: A
السؤال #24
A security analyst sees that a hacker has discovered some keys and they are being made available on a public website. The security analyst is then able to successfully decrypt that data using the keys from the website. Which of the following should the security analyst recommend to protect the affected data?
A. Key rotation
B. Key escrow
C. Zeroization
D. Cryptographic obfuscation
عرض الإجابة
اجابة صحيحة: B
السؤال #25
A security analyst has been tasked with providing key information in the risk register. Which of the following outputs or results would be used to BEST provide the information needed to determine the security posture for a risk decision? (Choose two.)
A. Password cracker
B. SCAP scanner
C. Network traffic analyzer
D. Vulnerability scanner
E. Port scanner
F. Protocol analyzer
عرض الإجابة
اجابة صحيحة: BD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: