لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following is used to prevent spoofing of e-mail addresses?
A. Public-Key Cryptography
B. DNS Security Extensions
C. Simple Mail Transfer Protocol
D. Sender Policy Framework
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which of the following is a benefit of stress-testing a network?
A. To determine the security configurations of the network
B. To determine bandwidth needs for the network
C. To determine device behavior in a DoS condition
D. To determine the connectivity of the network
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Which of the following best describes the CIS Controls?
A. Technical controls designed to augment the NIST 800 series
B. Technical, administrative, and policy controls based on current regulations and security best practices
C. Technical, administrative, and policy controls based on research provided by the SANS Institute
D. Technical controls designed to provide protection from the most damaging attacks based on current threat data
عرض الإجابة
اجابة صحيحة: D
السؤال #4
An organization has implemented a policy to detect and remove malicious software from its network. Which of the following actions is focused on correcting rather than preventing attack?
A. Training users to recognize potential phishing attempts
B. Disabling autorun features on all workstations on the network
C. Using Network access control to disable communication by hosts with viruses
D. Configuring a firewall to only allow communication to whitelisted hosts and ports
عرض الإجابة
اجابة صحيحة: C
السؤال #5
An organization has created a policy that allows software from an approved list of applications to be installed on workstations. Programs not on the list should not be installed. How can the organization best monitor compliance with the policy?
A. Performing regular port scans of workstations on the network
B. Creating an IDS signature to alert based on unknown "User-Agent " strings
C. Comparing system snapshots and alerting when changes are made
D. Auditing Active Directory and alerting when new accounts are created
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: