لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a par
A. Guarantee the reliability of standby systems through testing and simulation
B. Protect an organization from major computer services failure
C. Minimize the risk to the organization from delays in providing services
D. Maximize the decision-making required by personnel during a disaster
عرض الإجابة
اجابة صحيحة: BCA
السؤال #2
Which of the following response teams aims to foster cooperation and coordination in incident prevention, to prompt rapid reaction to incidents, and to promote information sharing among members and the community at large?
A. CERT
B. CSIRT
C. FedCIRC
D. FIRST
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Della works as a security manager for SoftTech Inc. She is training some of the newly recruited personnel in the field of security management. She is giving a tutorial on DRP. She explains that the major goal of a disaster recovery plan is to provide an organized way to make decisions if a disruptive event occurs and asks for the other objectives of the DRP. If you are among some of the newly recruited personnel in SoftTech Inc, what will be your answer for her question? Each correct answer represents a par
A. Guarantee the reliability of standby systems through testing and simulation
B. Protect an organization from major computer services failure
C. Minimize the risk to the organization from delays in providing services
D. Maximize the decision-making required by personnel during a disaster
عرض الإجابة
اجابة صحيحة: BCA
السؤال #4
Which of the following cryptographic system services assures the receiver that the received message has not been altered?
A. Authentication
B. Confidentiality
C. Non-repudiation
D. Integrity
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which of the following systems helps to detect the "abuse of privileges" attack that does not actually involve exploiting any security vulnerability?
A. Statistical Anomaly-Based ID system
B. Network-Based ID system
C. Signature-Based ID system
D. Host-Based ID system
عرض الإجابة
اجابة صحيحة: A
السؤال #6
Which of the following features of the Cisco MDS 9000 SAN Extension over IP Package help in implementing efficient FCIP-based business-continuity and disaster-recovery solutions? Each correct answer represents a complete solution. Choose all that apply.
A. Reset Account Lockout Counter After policy
B. Enforce Password Must Meet Complexity Requirements policy
C. Set Account Lockout Threshold policy
D. Set Account Lockout Duration policy
عرض الإجابة
اجابة صحيحة: BD
السؤال #7
You work as a Network administrator for Infonet Inc. The company has 135 Windows XP Professional computers and twenty Windows 2003 Server computers. You want to specify the number of invalid logon attempts allowed before a user account is locked out. What will you do to accomplish the task?
A. Scope and plan initiation
B. Plan approval and implementation
C. Business continuity plan development
D. Business impact assessment
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which of the following types of attacks occurs when an attacker successfully inserts an intermediary software or program between two communicating hosts?
A. Password guessing attack
B. Dictionary attack
C. Man-in-the-middle attack
D. Denial-of-service attack
عرض الإجابة
اجابة صحيحة: C
السؤال #9
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
A. Quantitative analysis
B. Estimate activity duration
C. Risk identification
D. Qualitative analysis
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?
A. At every status meeting of the project team, project risk management is an agenda item
B. Project risk management happens at every milestone
C. Project risk management has been concluded with the project planning
D. Project risk management is scheduled for every month in the 18-month project
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?
A. Asterisk logger
B. FAU
C. Access Pass View
D. Galleta
عرض الإجابة
اجابة صحيحة: C
السؤال #12
You are responsible for network and information security at a large hospital. It is a significant concern that any change to any patient record can be easily traced back to the person who made that change. What is this called?
A. Availability
B. Non repudiation
C. Confidentiality
D. Data Protection
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Fill in the blank: An ___________________ (AS) is a group of networks under a single administration and with single routing policies.
A. FCIP write acceleration
B. IVR
C. SAN extension tuner
D. FCIP compression
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following BCP teams is the first responder and deals with the immediate effects of the disaster?
A. Emergency management team
B. Damage assessment team
C. Off-site storage team
D. Emergency action team
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Which of the following tools in Helix Windows Live is used to reveal the database password of password protected MDB files created using Microsoft Access or with Jet Database Engine?
A. Asterisk logger
B. FAU
C. Access Pass View
D. Galleta
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Mark is the project manager of the HAR Project. The project is scheduled to last for eighteen months and six months already passed. Management asks Mark that how often the project team is participating in the risk reassessment of this project. What should Mark tell management if he is following the best practices for risk management?
A. At every status meeting of the project team, project risk management is an agenda item
B. Project risk management happens at every milestone
C. Project risk management has been concluded with the project planning
D. Project risk management is scheduled for every month in the 18-month project
عرض الإجابة
اجابة صحيحة: A
السؤال #17
You work as a project manager for TYU project. You are planning for risk mitigation. You need to identify the risks that will need a more in-depth analysis. Which of the following activities will help you in this?
A. Quantitative analysis
B. Estimate activity duration
C. Risk identification
D. Qualitative analysis
عرض الإجابة
اجابة صحيحة: D
السؤال #18
Which of the following statements best describes the difference between the role of a data owner and the role of a data custodian?
A. The custodian makes the initial information classification assignments and the operations manager implements the scheme
B. The custodian implements the information classification scheme after the initial assignment by the operations manager
C. The data custodian implements the information classification scheme after the initial assignment by the data owner
D. The data owner implements the information classification scheme after the initial assignment by the custodian
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: