لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An algorithm which is a part of the U.S. government's long-term project to develop a set of standards for publicly available cryptography as authorized by the Computer Security Act of 1987 accepts a message of 264 bits in length and a 160-bit message output digest is produced to complicate text searching. Which of the following algorithms is a family of two similar hash functions, with different block sizes, and uses 32-bit words and 64-bit words?
A. SHA-2
B. SHA-0
C. SHA-1
D. SHA-3
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A security strategy in which several protection layers are placed throughout an information system helps to prevent direct attacks against an information system and data because a break in one layer only leads the attacker to the next layer. What is this security strategy called?
A. Network Security Zoning
B. Defense in Depth
C. Multi-aspect Model
D. Threat Modeling
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Messy, a network defender, was hired to secure an organization's internal network. He deployed an IDS in which the detection process depends on observing and comparing the observed events with the normal behavior and then detecting any deviation from it. Identify the type of IDS employed by Messy in the above scenario.
A. Stateful protocol analysis
B. Anomaly-based
C. Signature-based
D. Application proxy
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)? Each correct answer represents a complete solution. Choose all that apply.
A. Denial-of-Service (DoS) attack
B. E-mail spoofing
C. Port scan attack
D. Shoulder surfing
عرض الإجابة
اجابة صحيحة: BD
السؤال #5
Which of the following statements are true about routers? Each correct answer represents a complete solution. Choose all that apply.
A. Routers are responsible for making decisions about which of several paths network (orInternet)traffic will follow
B. Routers do not limit physical broadcast traffic
C. Routers organize addresses into classes, which are used to determine how to move packets fromone network to another
D. Routers act as protocol translators and bind dissimilar networks
عرض الإجابة
اجابة صحيحة: ACD
السؤال #6
Cheryl, a forensic expert, was recruited to investigate a malicious activity performed by an anonymous hackers' group on an organization's systems. Using an automated tool, Cheryl was able to extract the malware file and analyze the assembly code instructions, which helped him understand the malware's purpose. Which of the following tools helped Cheryl extract and analyze the assembly code of the malware?
A. Virtual Box
B. OllyDbg
C. QualNet
D. VMware vSphere
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which of the following types of attacks cannot be prevented by technical measures only?
A. Brute force
B. Ping flood attack
C. Smurf DoS
D. Social engineering
عرض الإجابة
اجابة صحيحة: D
السؤال #8
Mary was surfing the Internet, and she wanted to hide her details and the content she was surfing over the web. She employed a proxy tool that makes his online activity untraceable. Identify the type of proxy employed by John in the above scenario.
A. Reverse proxy
B. Anonvmous proxy
C. Explicit proxy
D. SOCKS proxy
عرض الإجابة
اجابة صحيحة: B
السؤال #9
You are responsible for security at a company that uses a lot of Web applications. You are most concerned about flaws in those applications allowing some attacker to get into your network. What method would be best for finding such flaws?
A. Vulnerability scanning
B. Manual penetration testing
C. Automated penetration testing
D. Code review
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Bob, a security professional, was recruited by an organization to ensure that application services are being delivered as expected without any delay. To achieve this. Bob decided to maintain different backup servers for the same resources so that if one backup system fails, another will serve the purpose. Identify the IA principle employed by Bob in the above scenario.
A. Integrity
B. Confidentiality
C. Authentication
D. Availability
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Bob. a network specialist in an organization, is attempting to identify malicious activities in the network. In this process. Bob analyzed specific data that provided him a summary of a conversation between two network devices, including a source IP and source port, a destination IP and destination port, the duration of the conversation, and the information shared during the conversation. Which of the following types of network-based evidence was collected by Bob in the above scenario?
A. Statistical data
B. Alert data
C. Session data
D. Full content data
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Firewalking is a technique that can be used to gather information about a remote network protected by a firewall. This technique can be used effectively to perform information gathering attacks. In this technique, an attacker sends a crafted packet with a TTL value that is set to expire one hop past the firewall. Which of the following are pre-requisites for an attacker to conduct firewalking? Each correct answer represents a complete solution. Choose all that apply.
A. ICMP packets leaving the network should be allowed
B. An attacker should know the IP address of the last known gateway before the firewall
C. There should be a backdoor installed on the network
D. An attacker should know the IP address of a host located behind the firewall
عرض الإجابة
اجابة صحيحة: ABD
السؤال #13
Which of the following OSI layers is responsible for protocol conversion, data encryption/decryption, and data compression?
A. Transport layer
B. Presentation layer
C. Data-link layer
D. Network layer
عرض الإجابة
اجابة صحيحة: B
السؤال #14
The security of the network can be increased in a number of ways, for instance, by installing a special kind of web server and through packet filtering. What type of server is implemented as an intermediary server between a client and a server to act as a shield and protect and hide the computer from the outside network?
A. Application Server
B. Telnet Server
C. Web Server
D. Proxy Server
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Which of the following statements best describes a certification authority?
A. A certification authority is a type of encryption that uses a public key and a private key pair fordata encryption
B. A certification authority is an entity that issues digital certificates for use by other parties
C. A certification authority is a technique to authenticate digital documents by using computercryptography
D. A certification authority is a type of encryption that uses a single key to encrypt and decryp t data
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Each correct answer represents a complete solution. Choose all that apply.
A. WEP
B. WPA2
C. WPA
D. WEP2
عرض الإجابة
اجابة صحيحة: BC
السؤال #17
You work as a Network Administrator for Tech Perfect Inc. The company requires a secure wireless network. To provide security, you are configuring ISA Server 2006 as a firewall. While configuring ISA Server 2006, which of the following is NOT necessary?
A. Defining how ISA Server would cache Web contents
B. Defining ISA Server network configuration
C. Setting up of monitoring on ISA Server
D. Configuration of VPN access
عرض الإجابة
اجابة صحيحة: D
السؤال #18
Which of the following attack allows attackers to bypass client-ID security mechanisms and gain access privileges, and then inject malicious scripts into specific web pages?
A. Cross-Site Scripting (XSS)
B. Buffer Overflow
C. Denial-of-Service
D. Parameter/Form Tampering
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Which of the following representatives of incident response team takes forensic backups of the systems that are the focus of the incident?
A. Lead investigator
B. Information security representative
C. Technical representative
D. Legal representative
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: