لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following types of attacks is the result of vulnerabilities in a program due to poor programming techniques?
A. Evasion attack
B. Denial-of-Service (DoS) attack
C. Ping of death attack
D. Buffer overflow attack
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Fill in the blank with the appropriate term. ______ is a free Unix subsystem that runs on top of Windows.
A. Steganography
B. Social engineering
C. Web ripping
D. Email spoofing
عرض الإجابة
اجابة صحيحة: C
السؤال #3
Adam, a novice computer user, works primarily from home as a medical professional. He just bought a brand new Dual Core Pentium computer with over 3 GB of RAM. After about two months of working on his new computer, he notices that it is not running nearly as fast as it used to. Adam uses antivirus software, anti- spyware software, and keeps the computer up-to-date with Microsoft patches. After another month of working on the computer, Adam finds that his computer is even more noticeably slow. He also notice
A. Computer is infected with the stealth kernel level rootkit
B. Computer is infected with stealth virus
C. Computer is infected with the Stealth Trojan Virus
D. Computer is infected with the Self-Replication Worm
عرض الإجابة
اجابة صحيحة: A
السؤال #4
John used to work as a Network Administrator for We-are-secure Inc. Now he has resigned from the company for personal reasons. He wants to send out some secret information of the company. To do so, he takes an image file and simply uses a tool image hide and embeds the secret file within an image file of the famous actress, Jennifer Lopez, and sends it to his Yahoo mail id. Since he is using the image file to send the data, the mail server of his company is unable to filter this mail. Which of the following
A. Y
B. Nessus
C. Whisker
D. Fragroute
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?
A. Demon dialing
B. Warkitting
C. War driving
D. Wardialing
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Network mapping provides a security testing team with a blueprint of the organization. Which of the following steps is NOT a part of manual network mapping?
A. Gathering private and public IP addresses
B. Collecting employees information
C. Banner grabbing
D. Performing Neotracerouting
عرض الإجابة
اجابة صحيحة: D
السؤال #7
In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?
A. Ping of death
B. Jolt
C. Fraggle
D. Teardrop
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Adam has installed and configured his wireless network. He has enabled numerous security features such as changing the default SSID, enabling WPA encryption, and enabling MAC filtering on his wireless router. Adam notices that when he uses his wireless connection, the speed is sometimes 16 Mbps and sometimes it is only 8 Mbps or less. Adam connects to the management utility wireless router and finds out that a machine with an unfamiliar name is connected through his wireless connection. Paul checks the rout
A. NAT spoofing
B. DNS cache poisoning
C. MAC spoofing
D. ARP spoofing
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which of the following types of attacks is only intended to make a computer resource unavailable to its users?
A. Denial of Service attack
B. Replay attack
C. Teardrop attack
D. Land attack
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Session splicing is an IDS evasion technique in which an attacker delivers data in multiple small-sized packets to the target computer. Hence, it becomes very difficult for an IDS to detect the attack signatures of such attacks. Which of the following tools can be used to perform session splicing attacks? Each correct answer represents a complete solution. Choose all that apply.
A. Anti-spoofing
B. Authentication of users
C. Anti-replay
D. IP packet encryption
عرض الإجابة
اجابة صحيحة: BC
السؤال #11
Which of the following types of attack can guess a hashed password?
A. Brute force attack
B. Evasion attack
C. Denial of Service attack
D. Teardrop attack
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which of the following statements are true about tcp wrappers? Each correct answer represents a complete solution. (Choose all that apply.)
A. tcp wrapper provides access control, host address spoofing, client username lookups, etc
B. When a user uses a TCP wrapper, the inetd daemon runs the wrapper program tcpd instead of running the server program directly
C. tcp wrapper allows host or subnetwork IP addresses, names and/or ident query replies, to be used as tokens to filter for access control purposes
D. tcp wrapper protects a Linux server from IP address spoofing
عرض الإجابة
اجابة صحيحة: ABC
السؤال #13
Adam works as an Incident Handler for Umbrella Inc. He has been sent to the California unit to train the members of the incident response team. As a demo project he asked members of the incident response team to perform the following actions: ? Remove the network cable wires. ? Isolate the system on a separate VLAN ? Use a firewall or access lists to prevent communication into or out of the system. ? Change DNS entries to direct traffic away from compromised system Which of the following steps of the incide
A. Identification
B. Containment
C. Eradication
D. Recovery
عرض الإجابة
اجابة صحيحة: B
السؤال #14
US Garments wants all encrypted data communication between corporate office and remote location. They want to achieve following results: * Authentication of users * Anti-replay * Anti-spoofing * IP packet encryption They implemented IPSec using Authentication Headers (AHs). Which results does this solution provide? (Click the Exhibit button on the toolbar to see the case study.) Each correct answer represents a complete solution. Choose all that apply.
A. Kernel level rootkit
B. Library rootkit
C. Hypervisor rootkit
D. Boot loader rootkit
عرض الإجابة
اجابة صحيحة: AC

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: