لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
for SecureEnet Inc. His team is called to investigate the computer of an employee, who is suspected for classified data theft. Suspect's computer runs on Windows operating system. Peter wants to collect data and evidences for further analysis. He knows that in Windows operating system, the data is searched in pre-defined steps for proper and efficient analysis. Which of the following is the correct order for searching data on a Windows based system?
A. Volatile data, file slack, registry, memory dumps, file system, system state backup, interne t traces
B. Volatile data, file slack, file system, registry, memory dumps, system state backup, interne t traces
C. Volatile data, file slack, internet traces, registry, memory dumps, system state backup, file system
D. Volatile data, file slack, registry, system state backup, internet traces, file system, memory dumps
عرض الإجابة
اجابة صحيحة: B
السؤال #2
You are the Network Administrator for a large corporate network. You want to monitor all network traffic on your local network for suspicious activities and receive a notification when a possible attack is in process. Which of the following actions will you take for this?
A. Enable verbose logging on the firewall
B. Install a network-based IDS
C. Install a DMZ firewall
D. Install a host-based IDS
عرض الإجابة
اجابة صحيحة: B
السؤال #3
John, a novice web user, makes a new E-mail account and keeps his password as "apple", his favorite fruit. John's password is vulnerable to which of the following password cracking attacks? Each correct answer represents a complete solution. Choose all that apply.
A. Dictionary attack
B. Hybrid attack
C. Brute Force attack
D. Rule based attack
عرض الإجابة
اجابة صحيحة: ABC
السؤال #4
________ is a command-line tool that can check the DNS registration of a domain controller.
A. NETSH
B. DCDIAG
C. DNSCMD
D. NBTSTAT
عرض الإجابة
اجابة صحيحة: B
السؤال #5
You work as a Network Administrator for TechPerfect Inc. The company has a corporate intranet setup. A router is configured on your network to connect outside hosts to the internetworking. For security, you want to prevent outside hosts from pinging to the hosts on the internetwork. Which of the following steps will you take to accomplish the task?
A. Block the TCP protocol through ACL
B. Block the UDP protocol through ACL
C. Block the IPv6 protocol through ACL
D. Block the ICMP protocol through ACL
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which of the following proxy servers is also referred to as transparent proxies or forced proxies?
A. Tunneling proxy server
B. Reverse proxy server
C. Anonymous proxy server
D. Intercepting proxy server
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Sasha wants to add an entry to your DNS database for your mail server. Which of the following types of resource records will she use to accomplish this?
A. ANAME
B. SOA
C. MX
D. CNAME
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Andrew works as a System Administrator for NetPerfect Inc. All client computers on the network run on Mac OS X. The Sales Manager of the company complains that his MacBook is not able to boot. Andrew wants to check the booting process. He suspects that an error persists in the bootloader of Mac OS X. Which of the following is the default bootloader on Mac OS X that he should use to resolve the issue?
A. LILO
B. BootX
C. NT Loader
D. GRUB
عرض الإجابة
اجابة صحيحة: B
السؤال #9
are true? Each correct answer represents a complete solution. Choose two.
A. It can detect events scattered over the network
B. It can handle encrypted and unencrypted traffic equally
C. It cannot detect events scattered over the network
D. It is a technique that allows multiple computers to share one or more IP addresses
عرض الإجابة
اجابة صحيحة: BC
السؤال #10
Nathan works as a professional Ethical Hacker. He wants to see all open TCP/IP and UDP ports of his computer. Nathan uses the netstat command for this purpose but he is still unable to map open ports to the running process with PID, process name, and path. Which of the following commands will Nathan use to accomplish the task?
A. Pslist
B. ping
C. Psloggedon
D. fport
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Ryan, a malicious hacker submits Cross-Site Scripting (XSS) exploit code to the Website of Internet forum for online discussion. When a user visits the infected Web page, code gets automatically executed and Ryan can easily perform acts like account hijacking, history theft etc. Which of the following types of Cross-Site Scripting attack Ryan intends to do?
A. Document Object Model (DOM)
B. Non persistent
C. SAX
D. Persistent
عرض الإجابة
اجابة صحيحة: D
السؤال #12
What is the easiest way to verify that name resolution is functioning properly on a TCP/IP network?
A. Use the TRACERT command with the /pingname parameter
B. Check the IP statistics on the file server
C. Ping the source host with its computer name
D. Ping the source host with its IP address
عرض الإجابة
اجابة صحيحة: C
السؤال #13
You work as a Network Administrator for Tech Perfect Inc. Your company has a Windows 2000based network. You want to verify the connectivity of a host in the network. Which of the following utilities will you use?
A. PING
B. TELNET
C. TRACERT
D. NETSTAT
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Victor works as a network administrator for DataSecu Inc. He uses a dual firewall Demilitarized Zone (DMZ) to insulate the rest of the network from the portions that is available to the Internet. Which of the following security threats may occur if DMZ protocol attacks are performed? Each correct answer represents a complete solution. Choose all that apply.
A. Attacker can perform Zero Day attack by delivering a malicious payload that is not a part of the intrusion detection/prevention systems guarding the network
B. Attacker can gain access to the Web server in a DMZ and exploit the database
C. Attacker managing to break the first firewall defense can access the internal network without breaking the second firewall if it is different
D. Attacker can exploit any protocol used to go into the internal network or intranet of the com pany
عرض الإجابة
اجابة صحيحة: ABD
السؤال #15
Which of the following is known as a message digest?
A. Hash function
B. Hashing algorithm
C. Spider
D. Message authentication code
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: