لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A company would like to protect credit card information that is stored in a database from being exposed and reused. However, the current POS system does not support encryption. Which of the following would be BEST suited to secure this information?
A. asking
B. okenization
C. IP
D. SU/TLS
عرض الإجابة
اجابة صحيحة: B
السؤال #2
An upcoming project focuses on secure communications and trust between external parties. Which of the following security components will need to be considered to ensure a chosen trust provider is used and the selected option is highly scalable?
A. elf-signed certificate
B. ertificate attributes
C. ublic key infrastructure
D. omain validation
عرض الإجابة
اجابة صحيحة: C
السؤال #3
A security administrator needs to block a TCP connection using the corporate firewall. Because this connection is potentially a threat, the administrator does not want to send back an RST. Which of the following actions in the firewall rule would work BEST?
A. rop
B. eject
C. og alert
D. ermit
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A company is concerned about individuals driving a car into the building to gain access. Which of the following security controls would work BEST to prevent this from happening?
A. ollard
B. amera
C. larms
D. ignage
E. ccess control vestibule
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which of the following would satisfy three-factor authentication requirements?
A. assword, PIN, and physical token
B. IN, fingerprint scan, and iris scan
C. assword, fingerprint scan, and physical token
D. IN, physical token, and ID card
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which of the following measures the average time that equipment will operate before it breaks?
A. LE
B. TBF
C. TO
D. RO
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which of the following controls would provide the BEST protection against tailgating?
A. ccess control vestibule
B. losed-circuit television
C. roximity card reader
D. araday cage
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A desktop computer was recently stolen from a desk located in the lobby of an office building. Which of the following would be the BEST way to secure a replacement computer and deter future theft?
A. nstalling proximity card readers on all entryway doors
B. eploying motion sensor cameras in the lobby
C. ncrypting the hard drive on the new desktop
D. sing cable locks on the hardware
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which of the following BEST describes a technique that compensates researchers for finding vulnerabilities?
A. enetration testing
B. ode review
C. ardriving
D. ug bounty
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A security analyst is reviewing computer logs because a host was compromised by malware. After the computer was infected, it displayed an error screen and shut down. Which of the following should the analyst review FIRST to determine more information?
A. ump file
B. ystem log
C. eb application log
D. ecurity log
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: