لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A security operations technician is searching the log named /var/messages for any events that were associated with a workstation with the IP address 10.1.1.1. Which of the following would provide this information?
A. at /var/messages | grep 10
B. rep 10
C. rep /var/messages | cat 10
D. at 10
عرض الإجابة
اجابة صحيحة: A
السؤال #2
An administrator for a small company has one primary server to secure. The administrator would like to limit the subnets that are able to access the server and prevent the server from making outbound connections to the internet. Which of the following would be the least expensive way to achieve this objective?
A. TM
B. eb application firewall
C. ost-based firewall
D. GFW
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Which of the following would most likely include language prohibiting end users from accessing personal email from a company device?
A. LA
B. РА
C. DA
D. UP
عرض الإجابة
اجابة صحيحة: C
السؤال #4
A security administrator needs to provide secure access to internal networks for external partners. The administrator has given the PSK and other parameters to the third-party security administrator. Which of the following is being used to establish this connection?
A. erberos
B. SL/TLS
C. PSec
D. SH
عرض الإجابة
اجابة صحيحة: C
السؤال #5
An organization has hired a security analyst to perform a penetration test. The analyst captures 1Gb worth of inbound network traffic to the server and transfers the pap back to the machine for analysis. Which of the following tools should the analyst use to further review the pap?
A. map
B. URL
C. etcat
D. ireshark
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A security administrator is integrating several segments onto a single network. One of the segments, which includes legacy devices, presents a significant amount of risk to the network. Which of the following would allow users to access to the legacy devices without compromising the security of the entire network?
A. IDS
B. AC filtering
C. ump server
D. PSec
E. AT gateway
عرض الإجابة
اجابة صحيحة: C
السؤال #7
An organization is considering implementation of load balancing with the following requirements:1.Support both inbound and outbound workloads. 2.Support local clients. 3.Provide more flexibility and duplicate route-based load balancing. Which of the following solutions should the organization consider?
A. igh availability
B. cheduling
C. irtual IP
D. tateful firewall
عرض الإجابة
اجابة صحيحة: C
السؤال #8
While reviewing the let/shadow file, a security administrator notices files with the same value. Which of the following attacks should the administrator be concerned about?
A. laintext
B. irthday
C. rute-force
D. ainbow table
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A penetration tester was able to compromise a host using previously captured network traffic. Which of the following is the result of this action?
A. nteger overflow
B. ace condition
C. emory leak
D. eplay attack
عرض الإجابة
اجابة صحيحة: D
السؤال #10
An employee, who is using a mobile device for work, is required to use a fingerprint to unlock the device. Which of the following is this an example of?
A. omething you know
B. omething you are
C. omething you have
D. omewhere you are
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: