لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following statements is TRUE?
A. Sniffers operation on Layer 3 of the OSI model
B. Sniffers operation on both Layer 2 & Layer 3 of the OSImodel
C. Sniffers operation on the Layer 1 of the OSI model
D. Sniffers operation on Layer 2 of the OSI model
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A. Restore a random file
B. Perform a full restore
C. Read the first 512 bytes of the tape
D. Read the last 512 bytes of the tape
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?
A. [inurl:]
B. [info:]
C. [site:]
D. [related:]
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Tony is a penetration tester tasked with performing a penetration test. After gaining initial access to a target system, he finds a list of hashed passwords. Which of the following tools would not be useful for cracking the hashed passwords?
A. Hashcat
B. John the Ripper
C. THC-Hydra
D. netcat
عرض الإجابة
اجابة صحيحة: D
السؤال #5
This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?
A. WPA3-Personal
B. WPA3-Enterprise
C. WPA2-Enterprise
D. WPA2-Personal
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Blane is a security analyst for a law firm. One of the lawyers needs to send out an email to a client but he wants to know if the email is forwarded on to any other recipients. The client is explicitly asked not to re-send the email since that would be a violation of the lawyer's and client's agreement for this particular case. What can Blane use to accomplish this?
A. Blane can use a service such as ReadNotify tracking tool
B. He can use a split-DNS service to ensure the email is not forwarded on
C. A service such as HTTrack would accomplish this
D. Blane could use MetaGoofil tracking tool
عرض الإجابة
اجابة صحيحة: A
السؤال #7
What are common files on a web server that can be misconfigured and provide useful information for a hacker such as verbose error messages?
A. httpd
B. administration
C. php
D. idq
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which statement is TRUE regarding network firewalls preventing Web Application attacks?
A. Network firewalls can prevent attacks because they can detect malicious HTTP traffic
B. Network firewalls cannot prevent attacks because ports 80 and 443 must be opened
C. Network firewalls can prevent attacks if they are properly configured
D. Network firewalls cannot prevent attacks because they are too complex to configure
عرض الإجابة
اجابة صحيحة: B
السؤال #9
You are attempting to run an Nmap port scan on a web server. Which of the following commands would result in a scan of common ports with the least amount of noise in order to evade IDS?
A. nmap -A - Pn
B. nmap -sP -p-65535 -T5
C. nmap -sT -O -T0
D. nmap -A --host-timeout 99 -T1
عرض الإجابة
اجابة صحيحة: C
السؤال #10
User A is writing a sensitive email message to user B outside the local network. User A has chosen to use PKI to secure his message and ensure only user B can read the sensitive email. At what layer of the OSI layer does the encryption and decryption of the message take place?
A. Application
B. Transport
C. Session
D. Presentation
عرض الإجابة
اجابة صحيحة: D
السؤال #11
In order to show improvement of security over time, what must be developed?
A. Reports
B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Nathan is testing some of his network devices. Nathan is using Macof to try and flood the ARP cache of these switches. If these switches' ARP cache is successfully flooded, what will be the result?
A. The switches will route all traffic to the broadcast address created collisions
B. If the ARP cache is flooded, the switches will drop into pix mode making it less susceptible to attacks
C. The switches will drop into hub mode if the ARP cache is successfully flooded
D. Depending on the switch manufacturer, the device will either delete every entry in its ARP cache or reroute packets to the nearest switch
عرض الإجابة
اجابة صحيحة: C
السؤال #13
While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place. What We
A. Clickjacking
B. Cross-Site Scripting
C. Cross-Site Request Forgery
D. Web form input validation
عرض الإجابة
اجابة صحيحة: C
السؤال #14
While performing online banking using a Web browser, a user receives an email that contains a link to an interesting Web site. When the user clicks on the link, another Web browser session starts and displays a video of cats playing a piano. The next business day, the user receives what looks like an email from his bank, indicating that his bank account has been accessed from a foreign country. The email asks the user to call his bank and verify the authorization of a funds transfer that took place. What We
A. Clickjacking
B. Cross-Site Scripting
C. Cross-Site Request Forgery
D. Web form input validation
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: