لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A risk assessment concludes that the perimeter network has the highest potential for compromise by an attacker, and it is labeled as a critical risk environment. Which of the following is a valid compensating control to reduce the volume of valuable information in the perimeter network that an attacker could gain using active reconnaissance techniques?
A. A control that demonstrates that all systems authenticate using the approved authentication method
B. A control that demonstrates that access to a system is only allowed by using SSH
C. A control that demonstrates that firewall rules are peer reviewed for accuracy and approved before deployment
D. A control that demonstrates that the network security policy is reviewed and updated yearly
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A security analyst is reviewing the network security monitoring logs listed below: Which of the following is the analyst most likely observing? (Select two).
A. 10
B. 10
C. 10
D. 10
E. 10
F. 10
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A security analyst needs to automate the incident response process for malware infections. When the following logs are generated, an alert email should automatically be sent within 30 minutes: Which of the following is the best way for the analyst to automate alert generation?
A. Deploy a signature-based IDS
B. Install a UEBA-capable antivirus
C. Implement email protection with SPF
D. Create a custom rule on a SIEM
عرض الإجابة
اجابة صحيحة: D
السؤال #4
An organization implemented an extensive firewall access-control blocklist to prevent internal network ranges from communicating with a list of IP addresses of known command-and-control domains A security analyst wants to reduce the load on the firewall. Which of the following can the analyst implement to achieve similar protection and reduce the load on the firewall?
A. A DLP system
B. DNS sinkholing
C. IP address allow list
D. An inline IDS
عرض الإجابة
اجابة صحيحة: B
السؤال #5
A security analyst is analyzing the following output from the Spider tab of OWASP ZAP after a vulnerability scan was completed: Which of the following options can the analyst conclude based on the provided output?
A. The scanning vendor used robots to make the scanning job faster
B. The scanning job was successfully completed, and no vulnerabilities were detected
C. The scanning job did not successfully complete due to an out of scope error
D. The scanner executed a crawl process to discover pages to be assessed
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which of the following describes the difference between intentional and unintentional insider threats'?
A. Their access levels will be different
B. The risk factor will be the same
C. Their behavior will be different
D. The rate of occurrence will be the same
عرض الإجابة
اجابة صحيحة: C
السؤال #7
While reviewing system logs, a network administrator discovers the following entry: Which of the following occurred?
A. An attempt was made to access a remote workstation
B. The PsExec services failed to execute
C. A remote shell failed to open
D. A user was trying to download a password file from a remote system
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Which of the following lines from this output most likely indicates that attackers could quickly use brute force and determine the negotiated secret session key?
A. TLS_RSA_WITH_DES_CBC_SHA 56
B. TLS_DHE_RSA_WITH_AES_128_CBC_SHA 128 DH (1024 bits)
C. TLS_RSA_WITH_AES_256_CBC_SHA 256
D. TLS_DHE_RSA_WITH_AES_256_GCM_SHA256 DH (2048 bits)
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: