لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An engineer wants to inspect traffic to a cluster of web servers in a cloud environment Which of the following solutions should the engineer implement? (Select two).
A. CASB
B. WAF
C. Load balancer
D. VPN
E. TLS
F. DAST
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which of the following is used to validate a certificate when it is presented to a user?
A. OCSP
B. CSR
C. CA
D. CRC
عرض الإجابة
اجابة صحيحة: B
السؤال #3
As part of a company's ongoing SOC maturation process, the company wants to implement a method to share cyberthreat intelligence data with outside security partners. Which of the following will the company MOST likely implement?
A. TAXII
B. TLP
C. TTP
D. STIX
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Unauthorized devices have been detected on the internal network. The devices’ locations were traced to Ether ports located in conference rooms. Which of the following would be the best technical controls to implement to prevent these devices from accessing the internal network?
A. NAC
B. DLP
C. IDS
D. MFA
عرض الإجابة
اجابة صحيحة: C
السؤال #5
The spread of misinformation surrounding the outbreak of a novel virus on election day led to eligible voters choosing not to take the risk of going the polls. This is an example of:
A. prepending
B. an influence campaign
C. a watering-hole attack
D. intimidation
E. information elicitation
عرض الإجابة
اجابة صحيحة: A
السؤال #6
A company recently experienced a significant data loss when proprietary information was leaked to a competitor. The company took special precautions by using proper labels; however, email filter logs do not have any record of the incident. An investigation confirmed the corporate network was not breached, but documents were downloaded from an employee's COPE tablet and passed to the competitor via cloud storage. Which of the following is the best mitigation strategy to prevent this from happening in the fut
A. User training
B. CAsB
C. MDM
D. EDR
عرض الإجابة
اجابة صحيحة: CF
السؤال #7
Which Of the following is the best method for ensuring non-repudiation?
A. SSO
B. Digital certificate
C. Token
D. SSH key
عرض الإجابة
اجابة صحيحة: BF
السؤال #8
A security administrator examines the ARP table of an access switch and sees the following output: Which of the following is a potential threat that is occurring on this access switch?
A. DDoSonFa02 port
B. MAG flooding on Fa0/2 port
C. ARP poisoning on Fa0/1 port
D. DNS poisoning on port Fa0/1
عرض الإجابة
اجابة صحيحة: B
السؤال #9
You received the output of a recent vulnerability assessment. Review the assessment and scan output and determine the appropriate remedialion(s} 'or ?ach dewce. Remediation options may be selected multiple times, and some devices may require more than one remediation. If at any time you would like to biing bade the initial state ot the simulation, please dick me Reset All button.
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #10
A company is focused on reducing risks from removable media threats. Due to certain primary applications, removable media cannot be entirely prohibited at this time. Which of the following best describes the company's approach?
A. Compensating controls
B. Directive control
C. Mitigating controls
D. Physical security controls
عرض الإجابة
اجابة صحيحة: C
السؤال #11
A security administrator performs weekly vulnerability scans on all cloud assets and provides a detailed report. Which of the following describes the administrator's activities?
A. Continuous deployment
B. Continuous integration
C. Continuous validation
D. Continuous monitoring
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A user's laptop constantly disconnects from the Wi-Fi network. Once the laptop reconnects, the user can reach the internet but cannot access shared folders or other network resources. Which of the following types of attacks is the user MOST likely experiencing?
A. Bluejacking
B. Jamming
C. Rogue access point
D. Evil twin
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Which of the following environments utilizes dummy data and is MOST likely to be installed locally on a system that allows code to be assessed directly and modified easily with each build?
A. Production
B. Test
C. Staging
D. Development
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which of the following processes would most likely help an organization that has conducted an incident response exercise to improve performance and identify challenges?
A. Lessons learned
B. Identification
C. Simulation
D. Containment
عرض الإجابة
اجابة صحيحة: C
السؤال #15
A web server has been compromised due to a ransomware attack. Further Investigation reveals the ransomware has been in the server for the past 72 hours. The systems administrator needs to get the services back up as soon as possible. Which of the following should the administrator use to restore services to a secure state?
A. The last incremental backup that was conducted 72 hours ago
B. The last known-good configuration stored by the operating system
C. The last full backup that was conducted seven days ago
D. The baseline OS configuration
عرض الإجابة
اجابة صحيحة: B
السؤال #16
An employee received multiple messages on a mobile device. The messages instructing the employee to pair the device to an unknown device. Which of the following BEST describes What a malicious person might be doing to cause this issue to occur?
A. Jamming
B. Bluesnarfing
C. Evil twin
D. Rogue access point
عرض الإجابة
اجابة صحيحة: A
السؤال #17
A user downloaded an extension for a browser, and the user's device later became infected. The analyst who Is Investigating the Incident saw various logs where the attacker was hiding activity by deleting data. The following was observed running: New-Partition -DiskNumber 2 -UseMaximumSize -AssignDriveLetter C| Format-Volume -Driveletter C - FileSystemLabel "New"-FileSystem NTFS - Full -Force -Confirm:$false Which of the following is the malware using to execute the attack?
A. PowerShell
B. Python
C. Bash
D. Macros
عرض الإجابة
اجابة صحيحة: AB
السؤال #18
Hackers recently attacked a company's network and obtained several unfavorable pictures from the Chief Executive Officer's workstation. The hackers are threatening to send the images to the press if a ransom is not paid. Which of the following is impacted the MOST?
A. Identify theft
B. Data loss
C. Data exfiltration
D. Reputation
عرض الإجابة
اجابة صحيحة: A
السؤال #19
A security administrator needs to provide secure access to internal networks for external partners The administrator has given the PSK and other parameters to the third-party security administrator. Which of the following is being used to establish this connection?
A. Kerberos
B. SSL/TLS
C. IPSec
D. SSH
عرض الإجابة
اجابة صحيحة: C
السؤال #20
A security analyst receives an alert that indicates a user's device is displaying anomalous behavior The analyst suspects the device might be compromised Which of the following should the analyst to first?
A. Reboot the device
B. Set the host-based firewall to deny an incoming connection
C. Update the antivirus definitions on the device
D. Isolate the device
عرض الإجابة
اجابة صحيحة: D
السؤال #21
During an incident a company CIRT determine it is necessary to observe the continued network-based transaction between a callback domain and the malware running on an enterprise PC. Which of the following techniques would be BEST to enable this activity while reducing the risk of lateral spread and the risk that the adversary would notice any changes?
A. Physical move the PC to a separate internet pint of presence
B. Create and apply micro segmentation rules
C. Emulate the malware in a heavily monitored DM Z segment
D. Apply network blacklisting rules for the adversary domain
عرض الإجابة
اجابة صحيحة: A
السؤال #22
Recent changes to a company's BYOD policy require all personal mobile devices to use a two-factor authentication method that is not something you know or have. Which of the following will meet this requirement?
A. Facial recognition
B. Six-digit PIN
C. PKI certificate
D. Smart card
عرض الإجابة
اجابة صحيحة: B
السؤال #23
To reduce and limit software and infrastructure costs the Chief Information Officer has requested to move email services to the cloud. The cloud provider and the organization must have secunty controls to protect sensitive data Which of the following cloud services would best accommodate the request?
A. laaS
B. PaaS
C. DaaS
D. SaaS
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: