لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following would be the best way to block unknown programs from executing?
A. ccess control list
B. pplication allow list
C. ost-based firewall
D. LP solution
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following vulnerabilities is associated with installing software outside of a manufacturer’s approved software repository?
A. ailbreaking
B. emory injection
C. esource reuse
D. ide loading
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which of the following is used to add extra complexity before using a one-way data transformation algorithm?
A. ey stretching
B. ata masking
C. teganography
D. alting
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Which of the following is the most likely to be included as an element of communication in a security awareness program?
A. eporting phishing attempts or other suspicious activities
B. etecting insider threats using anomalous behavior recognition
C. erifying information when modifying wire transfer data
D. erforming social engineering as part of third-party penetration testing
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A company hired a consultant to perform an offensive security assessment covering penetration testing and social engineering. Which of the following teams will conduct this assessment activity?
A. hite
B. urple
C. lue
D. ed
عرض الإجابة
اجابة صحيحة: D
السؤال #6
An organization is building a new backup data center with cost-benefit as the primary requirement and RTO and RPO values around two days. Which of the following types of sites is the best for this scenario?
A. eal-time recovery
B. ot
C. old
D. arm
عرض الإجابة
اجابة صحيحة: C
السؤال #7
During an investigation, an incident response team attempts to understand the source of an incident. Which of the following incident response activities describes this process?
A. nalysis
B. essons learned
C. etection
D. ontainment
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A systems administrator receives the following alert from a file integrity monitoring tool:The hash of the cmd.exe file has changed. The systems administrator checks the OS logs and notices that no patches were applied in the last two months. Which of the following most likely occurred?
A. he end user changed the file permissions
B. cryptographic collision was detected
C. snapshot of the file system was taken
D. rootkit was deployed
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which of the following security control types does an acceptable use policy best represent?
A. etective
B. ompensating
C. orrective
D. reventive
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A cyber operations team informs a security analyst about a new tactic malicious actors are using to compromise networks.SIEM alerts have not yet been configured. Which of the following best describes what the security analyst should do to identify this behavior?
A. Digital forensics
B. -discovery
C. ncident response
D. hreat hunting
عرض الإجابة
اجابة صحيحة: D
السؤال #11
A security operations center determines that the malicious activity detected on a server is normal. Which of the following activities describes the act of ignoring detected activity in the future?
A. uning
B. ggregating
C. uarantining
D. rchiving
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A data administrator is configuring authentication for a SaaS application and would like to reduce the number of credentials employees need to maintain. The company prefers to use domain credentials to access new SaaS applications. Which of the following methods would allow this functionality?
A. SO
B. EAP
C. FA
D. EAP
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which of the following can be used to identify potential attacker activities without affecting production servers?
A. oney pot
B. ideo surveillance
C. ero Trust
D. eofencing
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following allows for the attribution of messages to individuals?
A. daptive identity
B. on-repudiation
C. uthentication
D. ccess logs
عرض الإجابة
اجابة صحيحة: B
السؤال #15
An administrator was notified that a user logged in remotely after hours and copied large amounts of data to a personal device. Which of the following best describes the user’s activity?
A. enetration testing
B. hishing campaign
C. xternal audit
D. nsider threat
عرض الإجابة
اجابة صحيحة: D
السؤال #16
A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?
A. ccept
B. ransfer
C. itigate
D. void
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which of the following roles, according to the shared responsibility model, is responsible for securing the company’s database in an IaaS model for a cloud environment?
A. lient
B. hird-party vendor
C. loud provider
D. BA
عرض الإجابة
اجابة صحيحة: A
السؤال #18
Which of the following is a hardware-specific vulnerability?
A. irmware version
B. uffer overflow
C. QL injection
D. ross-site scripting
عرض الإجابة
اجابة صحيحة: A
السؤال #19
A company is expanding its threat surface program and allowing individuals to security test the company’s internet-facing application. The company will compensate researchers based on the vulnerabilities discovered. Which of the following best describes the program the company is setting up?
A. pen-source intelligence
B. ug bounty
C. ed team
D. enetration testing
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Which of the following describes the process of concealing code or text inside a graphical image?
A. ymmetric encryption
B. ashing
C. ata masking
D. teganography
عرض الإجابة
اجابة صحيحة: D
السؤال #21
Employees in the research and development business unit receive extensive training to ensure they understand how to best protect company data. Which of the following is the type of data these employees are most likely to use in day-to-day work activities?
A. ncrypted
B. ntellectual property
C. ritical
D. ata in transit
عرض الإجابة
اجابة صحيحة: B
السؤال #22
A company has begun labeling all laptops with asset inventory stickers and associating them with employee IDs. Which of the following security benefits do these actions provide? (Choose two.)
A. end out periodic security reminders
B. pdate the content of new hire documentation
C. odify the content of recurring training
عرض الإجابة
اجابة صحيحة: AF
السؤال #23
HOTSPOT (Drag and Drop is not supported)You are security administrator investigating a potential infection on a network. Click on each host and firewall. Review all logs to determine which host originated the Infecton and then deny each remaining hosts clean or infected.If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A
السؤال #24
After a company was compromised, customers initiated a lawsuit. The company's attorneys have requested that the security team initiate a legal hold in response to the lawsuit. Which of the following describes the action the security team will most likely be required to take?
A. etain the emails between the security team and affected customers for 30 days
B. etain any communications related to the security breach until further notice
C. etain any communications between security members during the breach response
D. etain all emails from the company to affected customers for an indefinite period of time
عرض الإجابة
اجابة صحيحة: B
السؤال #25
A security analyst is reviewing alerts in the SIEM related to potential malicious network traffic coming from an employee’s corporate laptop. The security analyst has determined that additional data about the executable running on the machine is necessary to continue the investigation. Which of the following logs should the analyst use as a data source?
A. pplication
B. PS/IDS
C. etwork
D. ndpoint
عرض الإجابة
اجابة صحيحة: D
السؤال #26
An organization’s internet-facing website was compromised when an attacker exploited a buffer overflow. Which of the following should the organization deploy to best protect against similar attacks in the future?
A. GFW
B. AF
C. LS
D. D-WAN
عرض الإجابة
اجابة صحيحة: B
السؤال #27
Users at a company are reporting they are unable to access the URL for a new retail website because it is flagged as gambling and is being blocked. Which of the following changes would allow users to access the site?
A. reating a firewall rule to allow HTTPS traffic
B. onfiguring the IPS to allow shopping
C. uning the DLP rule that detects credit card data
D. pdating the categorization in the content filter
عرض الإجابة
اجابة صحيحة: D
السؤال #28
A company prevented direct access from the database administrators? workstations to the network segment that contains database servers. Which of the following should a database administrator use to access the database servers?
A. ump server
B. ADIUS
C. SM
D. oad balancer
عرض الإجابة
اجابة صحيحة: A
السؤال #29
Which of the following threat actors is the most likely to use large financial resources to attack critical systems located in other countries?
A. nsider
B. nskilled attacker
C. ation-state
D. acktivist
عرض الإجابة
اجابة صحيحة: C
السؤال #30
While troubleshooting a firewall configuration, a technician determines that a?deny any? policy should be added to the bottom of the ACL. The technician updates the policy, but the new policy causes several company servers to become unreachable. Which of the following actions would prevent this issue?
A. ocumenting the new policy in a change request and submitting the request to change management
B. esting the policy in a non-production environment before enabling the policy in the production network
C. isabling any intrusion prevention signatures on the 'deny any* policy prior to enabling the new policy
D. ncluding an 'allow any1 policy above the 'deny any* policy
عرض الإجابة
اجابة صحيحة: B
السؤال #31
A client asked a security company to provide a document outlining the project, the cost, and the completion time frame. Which of the following documents should the company provide to the client?
A. SA
B. LA
C. PA
D. OW
عرض الإجابة
اجابة صحيحة: D
السؤال #32
A security analyst is reviewing the following logs:Which of the following attacks is most likely occurring?
A. assword spraying
B. ccount forgery
C. ass-t he-hash
D. rute-force
عرض الإجابة
اجابة صحيحة: A
السؤال #33
Which of the following enables the use of an input field to run commands that can view or manipulate data?
A. ross-site scripting
B. ide loading
C. uffer overflow
D. QL injection
عرض الإجابة
اجابة صحيحة: D
السؤال #34
Which of the following provides the details about the terms of a test with a third-party penetration tester?
A. ules of engagement
B. upply chain analysis
C. ight to audit clause
D. ue diligence
عرض الإجابة
اجابة صحيحة: A
السؤال #35
Which of the following must be considered when designing a high-availability network? (Choose two).
A. ir gap the system
B. ove the system to a different network segment
C. reate a change control request
D. pply the patch to the system
عرض الإجابة
اجابة صحيحة: AE
السؤال #36
Which of the following is the best way to consistently determine on a daily basis whether security settings on servers have been modified?
A. utomation
B. ompliance checklist
C. ttestation
D. anual audit
عرض الإجابة
اجابة صحيحة: A
السؤال #37
A security analyst reviews domain activity logs and notices the following:Which of the following is the best explanation for what the security analyst has discovered?
A. he user jsmith's account has been locked out
B. keylogger is installed on [smith's workstation
C. n attacker is attempting to brute force ismith's account
D. ansomware has been deployed in the domain
عرض الإجابة
اجابة صحيحة: C
السؤال #38
A company is planning to set up a SIEM system and assign an analyst to review the logs on a weekly basis. Which of the following types of controls is the company setting up?
A. orrective
B. reventive
C. etective D
عرض الإجابة
اجابة صحيحة: C
السؤال #39
A security manager created new documentation to use in response to various types of security incidents. Which of the following is the next step the manager should take?
A. et the maximum data retention policy
B. ecurely store the documents on an air-gapped network
C. eview the documents' data classification policy
D. onduct a tabletop exercise with the team
عرض الإجابة
اجابة صحيحة: D
السؤال #40
A U.S.-based cloud-hosting provider wants to expand its data centers to new international locations. Which of the following should the hosting provider consider first?
A. ocal data protection regulations
B. isks from hackers residing in other countries
C. mpacts to existing contractual obligations
D. ime zone differences in log correlation
عرض الإجابة
اجابة صحيحة: A
السؤال #41
A company needs to provide administrative access to internal resources while minimizing the traffic allowed through the security boundary. Which of the following methods is most secure?
A. mplementing a bastion host
B. eploying a perimeter network
C. nstalling a WAF
D. tilizing single sign-on
عرض الإجابة
اجابة صحيحة: A
السؤال #42
An engineer needs to find a solution that creates an added layer of security by preventing unauthorized access to internal company resources. Which of the following would be the best solution?
A. DP server
B. ump server
C. roxy server
D. ypervisor
عرض الإجابة
اجابة صحيحة: B
السؤال #43
Which of the following is required for an organization to properly manage its restore process in the event of system failure?
A. RP
B. RP
C. PO
D. DLC
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: