لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A network administrator needs to determine Ihe sequence of a server farm's logs. Which of the following should the administrator consider? (Select TWO).
A. Chain of custody
B. Tags
C. Reports
D. Time stamps
E. Hash values
F. Time offset
عرض الإجابة
اجابة صحيحة: D
السؤال #2
A security analyst is investigating what appears to be unauthorized access to a corporate web application. The security analyst reviews the web server logs and finds the following entries: Which of the following password attacks is taking place?
A. Dictionary
B. Brute-force
C. Rainbow table
D. Spraying
عرض الإجابة
اجابة صحيحة: C
السؤال #3
A security administrator needs to block a TCP connection using the corporate firewall, Because this connection is potentially a threat. the administrator not want to back an RST Which of the following actions in rule would work best?
A. Drop
B. Reject
C. Log alert
D. Permit
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A company purchased cyber insurance to address items listed on the risk register. Which of the following strategies does this represent?
A. Accept
B. Transfer
C. Mitigate
D. Avoid
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A network penetration tester has successfully gained access to a target machine. Which of the following should the penetration tester do next?
A. Clear the log files of all evidence
B. Move laterally to another machine
C. Establish persistence for future use
D. Exploit a zero-day vulnerability
عرض الإجابة
اجابة صحيحة: CE
السؤال #6
The Chief Executive Officer (CEO) of an organization would like staff members to have the flexibility to work from home anytime during business hours, including during a pandemic or crisis. However, the CEO is concerned that some staff members may take advantage of the flexibility and work from high-risk countries while on holiday or outsource work to a third-party organization in another country. The Chief Information Officer believes the company can implement some basic controls to mitigate the majority o
A. Geolocation
B. Time-of-day restrictions
C. Certificates
D. Tokens
E. Geotagging
F. Role-based access controls
عرض الإجابة
اجابة صحيحة: E
السؤال #7
Which of the following roles is responsible for defining the protection type and Classification type for a given set of files?
A. General counsel
B. Data owner
C. Risk manager
D. Chief Information Officer
عرض الإجابة
اجابة صحيحة: B
السؤال #8
An employee's laptop was stolen last month. This morning, the was returned by the A cyberrsecurity analyst retrieved laptop and has since cybersecurity incident checklist Four incident handlers are responsible for executing the checklist. Which of the following best describes the process for evidence collection assurance?
A. Time stamp
B. Chain of custody
C. Admissibility
D. Legal hold
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A security analyst was asked to evaluate a potential attack that occurred on a publicly accessible section of the company's website. The malicious actor posted an entry in an attempt to trick users into clicking the following: Which of the following was most likely observed?
A. DLL injection
B. Session replay
C. SQLi
D. xss
عرض الإجابة
اجابة صحيحة: B
السؤال #10
A security analyst reviews web server logs and notices the following line: 104.35. 45.53 [22/May/2020:07 : 00:58 +0100] "GET . UNION ALL SELECT user login, user _ pass, user email from wp users—— HTTP/I.I" 200 1072 http://www.example.com/wordpress/wp—admin/ Which of the following vulnerabilities is the attacker trying to exploit?
A. SSRF
B. CSRF
C. xss
D. SQLi
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which of the following best describes the situation where a successfully onboarded employee who is using a fingerprint reader is denied access at the company's mam gate?
A. Crossover error rate
B. False match raw
C. False rejection
D. False positive
عرض الإجابة
اجابة صحيحة: D
السؤال #12
A company recently suffered a breach in which an attacker was able to access the internal mail servers and directly access several user inboxes. A large number of email messages were later posted online. Which of the following would bast prevent email contents from being released should another breach occur?
A. Implement S/MIME to encrypt the emails at rest
B. Enable full disk encryption on the mail servers
C. Use digital certificates when accessing email via the web
D. Configure web traffic to only use TLS-enabled channels
عرض الإجابة
اجابة صحيحة: AF
السؤال #13
A company wants the ability to restrict web access and monitor the websites that employees visit, Which Of the following would best meet these requirements?
A. Internet Proxy
B. VPN
C. WAF
D. Firewall
عرض الإجابة
اجابة صحيحة: D
السؤال #14
A penetration tester was able to compromise a host using previously captured network traffic. Which of the following is the result of this action?
A. Integer overflow
B. Race condition
C. Memory leak
D. Replay attack
عرض الإجابة
اجابة صحيحة: AF
السؤال #15
A security administrator Installed a new web server. The administrator did this to Increase the capacity (or an application due to resource exhaustion on another server. Which o( the following algorithms should the administrator use to split the number of the connections on each server In half?
A. Weighted response
B. Round-robin
C. Least connection
D. Weighted least connection
عرض الإجابة
اجابة صحيحة: C
السؤال #16
An organization is building a new headquarters and has placed fake cameras around the building in an attempt to discourage potential intruders. Which of the following kinds of controls describes this security method?
A. Detective
B. Deterrent
C. Directive
D. Corrective
عرض الإجابة
اجابة صحيحة: B
السؤال #17
A contractor overhears a customer recite their credit card number during a confidential phone call. The credit card Information is later used for a fraudulent transaction. Which of the following social engineering techniques describes this scenario?
A. Shoulder surfing
B. Watering hole
C. Vishing
D. Tailgating
عرض الإجابة
اجابة صحيحة: C
السؤال #18
A retail store has a business requirement to deploy a kiosk computer In an open area The kiosk computer's operating system has been hardened and tested. A security engineer IS concerned that someone could use removable media to install a rootkit Mich of the should the security engineer configure to BEST protect the kiosk computer?
A. Measured boot
B. Boot attestation
C. UEFI
D. EDR
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Which of the following social engineering attacks best describes an email that is primarily intended to mislead recipients into forwarding the email to others?
A. Hoaxing
B. Pharming
C. Watering-hole
D. Phishing
عرض الإجابة
اجابة صحيحة: D
السؤال #20
A company recently implemented a patch management policy; however, vulnerability scanners have still been flagging several hosts, even after the completion of the patch process. Which of the following is the most likely cause of the issue?
A. The vendor firmware lacks support
B. Zero-day vulnerabilities are being discovered
C. Third-party applications are not being patched
D. Code development is being outsourced
عرض الإجابة
اجابة صحيحة: D
السؤال #21
A malicious actor recently penetrated a company's network and moved laterally to the data center Upon investigation a forensics firm wants to know what was in the memory on the compromised server Which of the following files should be given to the forensics firm?
A. Security
B. Application
C. Dump
D. Syslog
عرض الإجابة
اجابة صحيحة: C
السؤال #22
During a recent cybersecurity audit, the auditors pointed out various types of vulnerabilities in the production area. The production area hardware runs applications that are critical to production Which of the following describes what the company should do first to lower the risk to the Production the hardware.
A. Back up the hardware
B. Apply patches
C. Install an antivirus solution
D. Add a banner page to the hardware
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: