لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following is the most common data loss path for an air-gapped network?
A. astion host
B. nsecured Bluetooth
C. npatched OS
D. emovable devices
عرض الإجابة
اجابة صحيحة: D
السؤال #2
A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?
A. esting input validation on the user input fields
B. erforming code signing on company-developed software
C. erforming static code analysis on the software
D. nsuring secure cookies are used
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which of the following should a systems administrator use to ensure an easy deployment of resources within the cloud provider?
A. oftware as a service
B. nfrastructure as code
C. nternet of Things
D. oftware-defined networking
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Security controls in a data center are being reviewed to ensure data is properly protected and that human life considerations are included. Which of the following best describes how the controls should be set up?
A. emote access points should fail closed
B. ogging controls should fail open
C. afety controls should fail open
D. ogical security controls should fail closed
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A technician notices an HTTP log-in page on a vulnerability scan report. Upon accessing the log-in page, the technician uses "admin" as both the username and the password to log in and access a security camera feed. Which of the following best describes the attack vector?
A. efault credentials
B. mpersonation
C. pen service ports
D. yposquatting
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which of the following would be the best resource for a software developer who is looking to improve secure coding practices for web applications?
A. WASP
B. ulnerability scan results
C. IST CSF
D. hird-party libraries
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A website visitor is required to provide properly formatted information in a specific field on a website form. Which of the following security measures is most likely used for this mandate?
A. nput validation
B. ode signing
C. QL injection
D. orm submission
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A systems technician is setting up a public-facing web server that needs to ensure traffic is secure. Which of the following steps should the systems technician take to begin this process?
A. omain validation
B. NS filtering
C. ildcard creation
D. SR generation
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?
A. apacity planning
B. edundancy
C. eographic dispersion
D. abletop exercise
عرض الإجابة
اجابة صحيحة: A
السؤال #10
An application security engineer is working to address issues stemming from situations where necessary approvals and testing were not done before code was introduced into the production environment. Which of the following would be the most appropriate for the engineer to configure?
A. egression testing
B. ranch protection
C. mpact analysis
D. hange control board
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: