لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An analyst is conducting routine vulnerability assessments on the company infrastructure. When performing these scans, a business-critical server crashes, and the cause is traced back to the vulnerability scanner. Which of the following is the cause of this issue?
A. The scanner is running without an agent installed
B. The scanner is running in active mode
C. The scanner is segmented improperly
D. The scanner is configured with a scanning window
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which of the following threat-modeling procedures is in the OWASP Web Security Testing Guide?
A. Review Of security requirements
B. Compliance checks
C. Decomposing the application
D. Security by design
عرض الإجابة
اجابة صحيحة: B
السؤال #3
A malicious actor has gained access to an internal network by means of social engineering. The actor does not want to lose access in order to continue the attack. Which of the following best describes the current stage of the Cyber Kill Chain that the threat actor is currently operating in?
A. Weaponization
B. Reconnaissance
C. Delivery
D. Exploitation
عرض الإجابة
اجابة صحيحة: D
السؤال #4
During security scanning, a security analyst regularly finds the same vulnerabilities in a critical application. Which of the following recommendations would best mitigate this problem if applied along the SDLC phase?
A. Conduct regular red team exercises over the application in production
B. Ensure that all implemented coding libraries are regularly checked
C. Use application security scanning as part of the pipeline for the CI/CDflow
D. Implement proper input validation for any data entry form
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which of the following best describes the document that defines the expectation to network customers that patching will only occur between 2:00 a.m. and 4:00 a.m.?
A. SLA
B. LOI
C. MOU
D. KPI
عرض الإجابة
اجابة صحيحة: A
السؤال #6
A company is implementing a vulnerability management program and moving from an on-premises environment to a hybrid IaaS cloud environment. Which of the following implications should be considered on the new hybrid environment?
A. The current scanners should be migrated to the cloud
B. Cloud-specific misconfigurations may not be detected by the current scanners
C. Existing vulnerability scanners cannot scan laaS systems
D. Vulnerability scans on cloud environments should be performed from the cloud
عرض الإجابة
اجابة صحيحة: CE
السؤال #7
While a security analyst for an organization was reviewing logs from web servers. the analyst found several successful attempts to downgrade HTTPS sessions to use cipher modes of operation susceptible to padding oracle attacks. Which of the following combinations of configuration changes should the organization make to remediate this issue? (Select two).
A. Configure the server to prefer TLS 1
B. Remove cipher suites that use CBC
C. Configure the server to prefer ephemeral modes for key exchange
D. Require client browsers to present a user certificate for mutual authentication
E. Configure the server to require HSTS
F. Remove cipher suites that use GCM
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which of the following best describes the goal of a disaster recovery exercise as preparation for possible incidents?
A. TO provide metrics and test continuity controls
B. To verify the roles of the incident response team
C. To provide recommendations for handling vulnerabilities
D. To perform tests against implemented security controls
عرض الإجابة
اجابة صحيحة: B
السؤال #9
An analyst is reviewing a vulnerability report and must make recommendations to the executive team. The analyst finds that most systems can be upgraded with a reboot resulting in a single downtime window. However, two of the critical systems cannot be upgraded due to a vendor appliance that the company does not have access to. Which of the following inhibitors to remediation do these systems and associated vulnerabilities best represent?
A. Proprietary systems
B. Legacy systems
C. Unsupported operating systems
D. Lack of maintenance windows
عرض الإجابة
اجابة صحيحة: B
السؤال #10
A cybersecurity team lead is developing metrics to present in the weekly executive briefs. Executives are interested in knowing how long it takes to stop the spread of malware that enters the network. Which of the following metrics should the team lead include in the briefs?
A. Mean time between failures
B. Mean time to detect
C. Mean time to remediate
D. Mean time to contain
عرض الإجابة
اجابة صحيحة: D
السؤال #11
While reviewing the web server logs a security analyst notices the following snippet ..\../..\../boot.ini Which of the following is being attempted?
A. Directory traversal
B. Remote file inclusion
C. Cross-site scripting
D. Remote code execution
E. Enumeration of/etc/pasawd
عرض الإجابة
اجابة صحيحة: C
السؤال #12
During an incident, an analyst needs to acquire evidence for later investigation. Which of the following must be collected first in a computer system, related to its volatility level?
A. Disk contents
B. Backup data
C. Temporary files
D. Running processes
عرض الإجابة
اجابة صحيحة: C
السؤال #13
An analyst wants to ensure that users only leverage web-based software that has been pre-approved by the organization. Which of the following should be deployed?
A. Blocklisting
B. Allowlisting
C. Graylisting
D. Webhooks
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A cloud team received an alert that unauthorized resources were being auto-provisioned. After investigating, the team suspects that crypto mining is occurring. Which of the following indicators would most likely lead the team to this conclusion?
A. High GPU utilization
B. Bandwidth consumption
C. Unauthorized changes
D. Unusual traffic spikes
عرض الإجابة
اجابة صحيحة: B
السؤال #15
A security administrator has been notified by the IT operations department that some vulnerability reports contain an incomplete list of findings. Which of the following methods should be used to resolve this issue?
A. Credentialed scan
B. External scan
C. Differential scan
D. Network scan
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A company receives a penetration test report summary from a third party. The report summary indicates a proxy has some patches that need to be applied. The proxy is sitting in a rack and is not being used, as the company has replaced it with a new one. The CVE score of the vulnerability on the proxy is a 9.8. Which of the following best practices should the company follow with this proxy?
A. Leave the proxy as is
B. Decomission the proxy
C. Migrate the proxy to the cloud
D. Patch the proxy
عرض الإجابة
اجابة صحيحة: C
السؤال #17
A security program was able to achieve a 30% improvement in MTTR by integrating security controls into a SIEM. The analyst no longer had to jump between tools. Which of the following best describes what the security program did?
A. Data enrichment
B. Security control plane
C. Threat feed combination
D. Single pane of glass
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Which of the following concepts is using an API to insert bulk access requests from a file into an identity management system an example of?
A. Command and control
B. Data enrichment
C. Automation
D. Single sign-on
عرض الإجابة
اجابة صحيحة: C
السؤال #19
An end-of-life date was announced for a widely used OS. A business-critical function is performed by some machinery that is controlled by a PC, which is utilizing the OS that is approaching the end-of- life date. Which of the following best describes a security analyst's concern?
A. Any discovered vulnerabilities will not be remediated
B. An outage of machinery would cost the organization money
C. Support will not be available for the critical machinery
D. There are no compensating controls in place for the OS
عرض الإجابة
اجابة صحيحة: A
السؤال #20
An incident response analyst notices multiple emails traversing the network that target only the administrators of the company. The email contains a concealed URL that leads to an unknown website in another country. Which of the following best describes what is happening? (Choose two.)
A. Beaconinq
B. Domain Name System hijacking
C. Social engineering attack
D. On-path attack
E. Obfuscated links
F. Address Resolution Protocol poisoning
عرض الإجابة
اجابة صحيحة: D
السؤال #21
A security analyst is performing vulnerability scans on the network. The analyst installs a scanner appliance, configures the subnets to scan, and begins the scan of the network. Which of the following would be missing from a scan performed with this configuration?
A. Operating system version
B. Registry key values
C. Open ports
D. IP address
عرض الإجابة
اجابة صحيحة: D
السؤال #22
After conducting a cybersecurity risk assessment for a new software request, a Chief Information Security Officer (CISO) decided the risk score would be too high. The CISO refused the software request. Which of the following risk management principles did the CISO select?
A. Avoid
B. Transfer
C. Accept
D. Mitigate
عرض الإجابة
اجابة صحيحة: A
السؤال #23
A security analyst is reviewing events that occurred during a possible compromise. The analyst obtains the following log: Which of the following is most likely occurring, based on the events in the log?
A. An adversary is attempting to find the shortest path of compromise
B. An adversary is performing a vulnerability scan
C. An adversary is escalating privileges
D. An adversary is performing a password stuffing attack
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: