لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Henry, head of network security at Gentech, has discovered a general report template that someone has reserved only for the CEO. Since the file has to be editable, viewable, and deletable by everyone, what permission value should he set?
A. 777
B. 700
C. 755
D. 0600
عرض الإجابة
اجابة صحيحة: A
السؤال #2
John works as a C programmer. He develops the following C program: His program is vulnerable to a __________ attack.
A. SQL injection
B. Denial-of-Service
C. Buffer overflow
D. Cross site scripting
عرض الإجابة
اجابة صحيحة: C
السؤال #3
John is working as a network defender at a well-reputed multinational company. He wanted to implement security that can help him identify any future attacks that can be targeted toward his organization and take appropriate security measures and actions beforehand to defend against them. Which one of the following security defense techniques should be implement?
A. Reactive security approach
B. Retrospective security approach
C. Proactive security approach
D. Preventive security approach
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Elden is working as a network administrator at an IT company. His organization opted for a virtualization technique in which the guest OS is aware of the virtual environment in which it is running and communicates with the host machines for requesting resources. Identify the virtualization technique implemented by Elden's organization.
A. Hybrid virtualization
B. Hardware-assisted virtualization
C. Full virtualization
D. Para virtualization
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?
A. IGMP
B. ICMP
C. EGP
D. OSPF
عرض الإجابة
اجابة صحيحة: C
السؤال #6
John works as a C programmer. He develops the following C program: His program is vulnerable to a __________ attack.
A. SQL injection
B. Denial-of-Service
C. Buffer overflow
D. Cross site scripting
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
A. Sequence Number
B. Header Length
C. Acknowledgment Number
D. Source Port Address
عرض الإجابة
اجابة صحيحة: AC
السؤال #8
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
A. Wireless sniffer
B. Spectrum analyzer
C. Protocol analyzer
D. Performance Monitor
عرض الإجابة
اجابة صحيحة: AC
السؤال #9
Identify the type of event that is recorded when an application driver loads successfully in Windows.
A. Success Audit
B. Error
C. Warning
D. Information
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which of the following security models enable strict identity verification for every user or device attempting to access the network resources? 1. Zero-trust network model 2. Castle-and-Moat model
A. Both 1 and 2
B. 1 only
C. 2 only
D. None
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
A. Sequence Number
B. Header Length
C. Acknowledgment Number
D. Source Port Address
عرض الإجابة
اجابة صحيحة: D
السؤال #12
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
A. The router does not have a configuration file
B. There is a need to set operating parameters
C. The user interrupts the boot sequence
D. The router does not find a valid operating system image
عرض الإجابة
اجابة صحيحة: DC

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: