لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Fill in the blank with the appropriate name. _____is a list, which specifies the order of volatility of data in a Windows based system.
A. RFC 3227
عرض الإجابة
اجابة صحيحة: A
السؤال #2
John works as a professional Ethical Hacker. He has been assigned a project to test the security of www.we-are-secure.com. He enters the following command on the Linux terminal: chmod 741 secure.c Considering the above scenario, which of the following statements are true? Each correct answer represents a complete solution. Choose all that apply.
A. By the octal representation of the file access permission, John is restricting the group members to only read the secure
B. The textual representation of the file access permission of 741 will be -rwxr--rw-
C. John is providing all rights to the owner of the file
D. John is restricting a guest to only write or execute the secure
عرض الإجابة
اجابة صحيحة: AC
السؤال #3
Which of the following file systems provides file-level security?
A. CDFS
B. FAT
C. FAT32
D. NTFS
عرض الإجابة
اجابة صحيحة: D
السؤال #4
John works for an Internet Service Provider (ISP) in the United States. He discovered child pornography material on a Web site hosted by the ISP. John immediately informed law enforcement authorities about this issue. Under which of the following Acts is John bound to take such an action?
A. Civil Rights Act of 1991
B. PROTECT Act
C. Civil Rights Act of 1964
D. Sexual Predators Act
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which of the following tools are used for footprinting? Each correct answer represents a complete solution. Choose all that apply.
A. Sam spade
B. Traceroute
C. Whois
D. Brutus
عرض الإجابة
اجابة صحيحة: ABC
السؤال #6
Which of the following file systems cannot be used to install an operating system on the hard disk drive? Each correct answer represents a complete solution. Choose two.
A. Windows NT file system (NTFS)
B. High Performance File System (HPFS)
C. Log-structured file system (LFS)
D. Compact Disc File System (CDFS)
E. Novell Storage Services (NSS)
عرض الإجابة
اجابة صحيحة: CD
السؤال #7
In which of the following security tests does the security testing team simulate as an employee or other person with an authorized connection to the organization's network?
A. Remote network
B. Local network
C. Remote dial-up network
D. Stolen equipment
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which of the following is a set of exclusive rights granted by a state to an inventor or his assignee for a fixed period of time in exchange for the disclosure of an invention?
A. Snooping
B. Copyright
C. Utility model
D. Patent
عرض الإجابة
اجابة صحيحة: D
السؤال #9
You work as a Network Administrator for McNeel Inc. You want to encrypt each user's MY DOCUMENTS folder. You decide to use Encrypting File System (EFS). You plan to write a script for encryption. Which of the following tools will you use to encrypt specified folders?
A. Windows Explorer
B. EFSINFO
C. CIPHER
D. SYSKEY
عرض الإجابة
اجابة صحيحة: C
السؤال #10
The MBR of a hard disk is a collection of boot records that contain disk information such as disk architecture, cluster size, and so on. The main work of the MBR is to locate and run necessary operating system files that are required to run a hard disk. In the context of the operating system, MBR is also known as the boot loader. Which of the following viruses can infect the MBR of a hard disk? Each correct answer represents a complete solution. Choose two.
A. Stealth
B. Boot sector
C. Multipartite
D. File
عرض الإجابة
اجابة صحيحة: BC
السؤال #11
Which of the following registry hives stores configuration information specific to a particular user who is currently logged on to the computer?
A. HKEY_USERS
B. HKEY_CLASSES_ROOT
C. HKEY_CURRENT_USER
D. HKEY_LOCAL_MACHINE
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which of the following file systems contains hardware settings of a Linux computer?
A. /var
B. /etc
C. /proc
D. /home
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Nathan works as a Computer Hacking Forensic Investigator for SecureEnet Inc. He uses Visual TimeAnalyzer software to track all computer usage by logging into individual users account or specific projects and compile detailed accounts of time spent within each program. Which of the following functions are NOT performed by Visual TimeAnalyzer? Each correct answer represents a complete solution. Choose all that apply.
A. It monitors all user data such as passwords and personal documents
B. It gives parents control over their children's use of the personal computer
C. It tracks work time, pauses, projects, costs, software, and internet usage
D. It records specific keystrokes and run screen captures as a background process
عرض الإجابة
اجابة صحيحة: AD
السؤال #14
You work as a Network Administrator for Blue Bell Inc. You want to install Windows XP Professional on your computer, which already has Windows Me installed. You want to configure your computer to dual boot between Windows Me and Windows XP Professional. You have a single 40GB hard disk. Which of the following file systems will you choose to dual-boot between the two operating systems?
A. NTFS
B. FAT32
C. CDFS
D. FAT
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which of the following is a password-cracking program?
A. NetSphere
B. L0phtcrack
C. Netcat
D. SubSeven
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: