لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following is a technique used to attack an Ethernet wired or wireless network?
A. DNS poisoning
B. Keystroke logging
C. Mail bombing
D. ARP poisoning
عرض الإجابة
اجابة صحيحة: D
السؤال #2
model is true?
A. In this model, a user can access resources according to his role in the organization
B. In this model, the permissions are uniquely assigned to each user account
C. In this model, the same permission is assigned to each user account
D. In this model, the users can access resources according to their seniority
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following refers to encrypted text?
A. Plaintext
B. Cookies
C. Hypertext
D. Ciphertext
عرض الإجابة
اجابة صحيحة: D
السؤال #4
You work as a Network Administrator for NetTech Inc. The company has a network that consists of 200 client computers and ten database servers. One morning, you find that a hacker is accessing unauthorized data on a database server on the network. Which of the following actions will you take to preserve the evidences? Each correct answer represents a complete solution. Choose three.
A. Prevent a forensics experts team from entering the server room
B. Preserve the log files for a forensics expert
C. Prevent the company employees from entering the server room
D. Detach the network cable from the database server
عرض الإجابة
اجابة صحيحة: BCD
السؤال #5
Which of the following are the benefits of information classification for an organization?
A. It helps identify which information is the most sensitive or vital to an organization
B. It ensures that modifications are not made to data by unauthorized personnel or processes
C. It helps identify which protections apply to which information
D. It helps reduce the Total Cost of Ownership (TCO)
عرض الإجابة
اجابة صحيحة: AC
السؤال #6
Which of the following protocols is used to verify the status of a certificate?
A. CEP
B. HTTP
C. OSPF
D. OCSP
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Which of the following heights of fence deters only casual trespassers?
A. 3 to 4 feet
B. 2 to 2
C. 8 feet
D. 6 to 7 feet
عرض الإجابة
اجابة صحيحة: A
السؤال #8
Fill in the blank with the appropriate value. Service Set Identifiers (SSIDs) are case sensitive text strings that have a maximum length of_______ characters.
A. 32
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which of the following groups represents the most likely source of an asset loss through the inappropriate use of computers?
A. Customers
B. Employees
C. Visitors
D. Hackers
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Andrew works as a Network Administrator for Infonet Inc. The company's network has a Web server that hosts the company's Web site. Andrew wants to increase the security of the Web site by implementing Secure Sockets Layer (SSL). Which of the following types of encryption does SSL use? Each correct answer represents a complete solution. Choose two.
A. Secret
B. Symmetric
C. Asymmetric
D. Synchronous
عرض الإجابة
اجابة صحيحة: BC
السؤال #11
Which of the following are methods used for authentication? Each correct answer represents a complete solution. Choose all that apply.
A. Smart card
B. Biometrics
C. Username and password
D. Magnetic stripe card
عرض الإجابة
اجابة صحيحة: ABCD
السؤال #12
Which of the following statements about the authentication concept of information security management is true?
A. It establishes the users' identity and ensures that the users are who they say they are
B. It ensures that modifications are not made to data by unauthorized personnel or processes
C. It ensures the reliable and timely access to resources
D. It determines the actions and behaviors of a single individual within a system, and identifies that particular individual
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Mark works as a Network Administrator for NetTech Inc. He wants users to access only those resources that are required for them. Which of the following access control models will he use?
A. Role-Based Access Control
B. Discretionary Access Control
C. Mandatory Access Control
D. Policy Access Control
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following are the differences between PPTP and L2TP? Each correct answer represents a complete solution. Choose three.
A. PPTP is supported by most industry vendors, while L2TP is a proprietary Microsoft standard
B. L2TP does not provide any kind of security
C. PPTP connections use Microsoft Point-to-Point Encryption (MPPE), whereas L2TP uses Data Encryption Standard (DES)
D. L2TP may be used with IPSec, while PPTP stands alone
عرض الإجابة
اجابة صحيحة: BCD
السؤال #15
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?
A. Sanitization
B. Hardening
C. Authentication
D. Cryptography
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: