لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You work as a Network Administrator for Blue Bell Inc. You want to install Windows XP Professional on your computer, which already has Windows Me installed.You want to configure your computer to dual boot between Windows Me and Windows XP Professional. You have a single 40GB hard disk.Which of the following file systems will you choose to dual-boot between the two operating systems?
A. TFS
B. AT32
C. DFS
D. AT
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following tools can be used to perform tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing?
A. ohn the Ripper
B. 0phtcrack
C. biwan
D. ain
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Which of the following modules of OS X kernel (XNU) provides the primary system program interface?
A. SD
B. IBKERN
C. /O Toolkit
D. ach
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Adam works as a Computer Hacking Forensic Investigator for a garment company in the United States. A project has been assigned to him to investigate a case of a disloyal employee who is suspected of stealing design of the garments, which belongs to the company and selling those garments of the same design under different brand name. Adam investigated that the company does not have any policy related to the copy of design of the garments. He also investigated that the trademark under which the employee is se
A. rademark law
B. yber law
C. opyright law
D. spionage law
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which of the following type of file systems is not supported by Linux kernel?
A. FAT
B. TFS
C. FS
D. AT32
عرض الإجابة
اجابة صحيحة: D
السؤال #6
TCP FIN scanning is a type of stealth scanning through which the attacker sends a FIN packet to the target port. If the port is closed, the victim assumes that this packet was sent mistakenly by the attacker and sends the RST packet to the attacker. If the port is open, the FIN packet will be ignored and the port will drop the packet. Which of the following operating systems can be easily identified with the help of TCP FIN scanning?
A. olaris
B. ed Hat
C. noppix
D. indows
عرض الإجابة
اجابة صحيحة: D
السؤال #7
You work as a Network Administrator for Perfect Solutions Inc. You install Windows 98 on a computer. By default, which of the following folders does Windows 98 setup use to keep the registry tools?
A. SYSTEMROOT$REGISTRY
B. SYSTEMROOT$WINDOWS
C. SYSTEMROOT$WINDOWSREGISTRY
D. SYSTEMROOT$WINDOWSSYSTEM32
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
A. iretap Act
B. omputer Fraud and Abuse Act
C. conomic Espionage Act of 1996
D. lectronic Communications Privacy Act of 1986
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Adam, a malicious hacker has successfully gained unauthorized access to the Linux system ofUmbrella Inc. Web server of the company runs on Apache. He has downloaded sensitive documents and database files from the computer. After performing these malicious tasks, Adam finally runs the following command on the Linux command box before disconnecting. for (( i = 0;i<11;i++ )); do dd if=/dev/random of=/dev/hda && dd if=/dev/zero of=/dev/hda doneWhich of the following actions does Adam want to perform by the abov
A. aking a bit stream copy of the entire hard disk for later download
B. eleting all log files present on the system
C. iping the contents of the hard disk with zeros
D. nfecting the hard disk with polymorphic virus strings
عرض الإجابة
اجابة صحيحة: C
السؤال #10
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He receives the following e- mail:The e-mail that John has received is an example of __________.
A. irus hoaxes
B. pambots
C. ocial engineering attacks
D. hain letters
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: