لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following programs is usually targeted at Microsoft Office products?
A. Polymorphic virus
B. Multipart virus
C. Macro virus
D. Stealth virus
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Passive reconnaissance involves collecting information through which of the following?
A. Social engineering
B. Network traffic sniffing
C. Man in the middle attacks
D. Publicly accessible sources
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
A. Paros Proxy
B. BBProxy
C. BBCrack
D. Blooover
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A. Restore a random file
B. Perform a full restore
C. Read the first 512 bytes of the tape
D. Read the last 512 bytes of the tape
عرض الإجابة
اجابة صحيحة: B
السؤال #5
This type of Port Scanning technique splits TCP header into several packets so that the packet filters are not able to detect what the packets intends to do.
A. UDP Scanning
B. IP Fragment Scanning
C. Inverse TCP flag scanning
D. ACK flag scanning
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Why attackers use proxy servers?
A. Faster bandwidth performance and increase in attack speed
B. To hide the source IP address so that an attacker can hack without any legal corollary
C. To ensure the exploits used in the attacks always flip reverse vectors
D. Interrupt the remote victim's network traffic and reroute the packets to attackers machine
عرض الإجابة
اجابة صحيحة: B
السؤال #7
What port number is used by Kerberos protocol?
A. 88
B. 44
C. 487
D. 419
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Bluetooth uses which digital modulation technique to exchange information between paired devices?
A. PSK (phase-shift keying)
B. FSK (frequency-shift keying)
C. ASK (amplitude-shift keying)
D. QAM (quadrature amplitude modulation)
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which of the following is an application that requires a host application for replication?
A. Micro
B. Worm
C. Trojan
D. Virus
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Syslog is a standard for logging program messages. It allows separation of the software that generates messages from the system that stores them and the software that reports and analyzes them. It also provides devices, which would otherwise be unable to communicate a means to notify administrators of problems or performance. [ECCouncil-EC0-350-5.1/ECCouncil-EC0-350-7_2.png] What default port Syslog daemon listens on?
A. 242
B. 312
C. 416
D. 514
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Jack Hacker wants to break into Brown Co.'s computers and obtain their secret double fudge cookie recipe. Jack calls Jane, an accountant at Brown Co., pretending to be an administrator from Brown Co. Jack tells Jane that there has been a problem with some accounts and asks her to verify her password with him ''just to double check our records.'' Jane does not suspect anything amiss, and parts with her password. Jack can now access Brown Co.'s computers with a valid user name and password, to steal the cooki
A. Reverse Psychology
B. Reverse Engineering
C. Social Engineering
D. Spoofing Identity
E. Faking Identity
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Neil is a network administrator working in Istanbul. Neil wants to setup a protocol analyzer on his network that will receive a copy of every packet that passes through the main office switch. What type of port will Neil need to setup in order to accomplish this?
A. Neil will have to configure a Bridged port that will copy all packets to the protocol analyzer
B. Neil will need to setup SPAN port that will copy all network traffic to the protocol analyzer
C. He will have to setup an Ether channel port to get a copy of all network traffic to the analyzer
D. He should setup a MODS port which will copy all network traffic
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Ursula is a college student at a University in Amsterdam. Ursula originally went to college to study engineering but later changed to marine biology after spending a month at sea with her friends. These friends frequently go out to sea to follow and harass fishing fleets that illegally fish in foreign waters. Ursula eventually wants to put companies practicing illegal fishing out of business. Ursula decides to hack into the parent company's computers and destroy critical data knowing fully well that, if cau
A. Ursula would be considered a gray hat since she is performing an act against illegal activities
B. She would be considered a suicide hacker
C. She would be called a cracker
D. Ursula would be considered a black hat
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which of the following describes the characteristics of a Boot Sector Virus?
A. Moves the MBR to another location on the RAM and copies itself to the original location of the MBR
B. Moves the MBR to another location on the hard disk and copies itself to the original location of the MBR
C. Modifies directory table entries so that directory entries point to the virus code instead of the actual program
D. Overwrites the original MBR and only executes the new virus code
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Jake works as a system administrator at Acme Corp. Jason, an accountant of the firm befriends him at the canteen and tags along with him on the pretext of appraising him about potential tax benefits. Jason waits for Jake to swipe his access card and follows him through the open door into the secure systems area. How would you describe Jason's behavior within a security context?
A. Smooth Talking
B. Swipe Gating
C. Tailgating
D. Trailing
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Which of the following buffer overflow exploits are related to Microsoft IIS web server? (Choose three)
A. Internet Printing Protocol (IPP) buffer overflow
B. Code Red Worm
C. Indexing services ISAPI extension buffer overflow
D. NeXT buffer overflow
عرض الإجابة
اجابة صحيحة: ABC
السؤال #17
In order to show improvement of security over time, what must be developed?
A. Reports
B. Testing tools
C. Metrics
D. Taxonomy of vulnerabilities
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Bob waits near a secured door, holding a box. He waits until an employee walks up to the secured door and uses the special card in order to access the restricted area of the target company. Just as the employee opens the door, Bob walks up to the employee (still holding the box) and asks the employee to hold the door open so that he can enter. What is the best way to undermine the social engineering activity of tailgating?
A. Issue special cards to access secure doors at the company and provide a one-time only brief description of use of the special card
B. Educate and enforce physical security policies of the company to all the employees on a regular basis
C. Setup a mock video camera next to the special card reader adjacent to the secure door
D. Post a sign that states, "no tailgating" next to the special card reader adjacent to the secure door
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: