لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following is an UDP based protocol?
A. LDAP
B. telnet
C. IMAP
D. SNMP
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which of the following features of Windows 7 allows an administrator to both passively review installed software and configure policies to prevent out-of-date or insecure software from running?
A. Direct Access
B. Software Restriction Policies
C. App Locker
D. User Account Control
عرض الإجابة
اجابة صحيحة: C
السؤال #3
When considering ingress filtering, why should all inbound packets be dropped if they contain a source address from within the protected network address space?
A. The packets are probably corrupted
B. The packets may have been accidentally routed onto the Internet
C. The packets may be deliberately spoofed by an attacker
D. The packets are a sign of excess fragmentation
E. A and B
F. B and C
G. B and D
H. A and D
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which of the following statements about IPSec are true? Each correct answer represents a complete solution. Choose two.
A. It uses Internet Protocol (IP) for data integrity
B. It uses Authentication Header (AH) for data integrity
C. It uses Password Authentication Protocol (PAP) for user authentication
D. It uses Encapsulating Security Payload (ESP) for data confidentiality
عرض الإجابة
اجابة صحيحة: BD
السؤال #5
Which of the four basic transformations in the AES algorithm involves the leftward circular movement of state data?
A. SubBytes
B. MixColumns
C. AddRoundKey
D. Shift Rows
عرض الإجابة
اجابة صحيحة: D
السؤال #6
An employee attempting to use your wireless portal reports receiving the error shown below. Which scenario is occurring? [GIAC-GSEC-7.0/GIAC-GSEC-5_2.png]
A. A denial-of-service attack is preventing a response from the portal
B. Another access point is deauthenticating legitimate clients
C. The encrypted data is being intercepted and decrypted
D. Another access point is attempting to intercept the data
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Which of the following services resolves host name to IP Address?
A. Computer Browser
B. DHCP
C. DNS
D. WINS
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which Linux file lists every process that starts at boot time?
A. inetd
B. netsrv
C. initd
D. inittab
عرض الإجابة
اجابة صحيحة: D
السؤال #9
The TTL can be found in which protocol header?
A. It is found in byte 8 of the DNS header
B. It is found in byte 8 of the ICMP header
C. It is found in byte 8 of the TCP header
D. It is found in byte 8 of the IP header
عرض الإجابة
اجابة صحيحة: D
السؤال #10
In an Active Directory domain, which is the preferred method of keeping host computers patched?
A. Deliver updates through a web caching proxy for faster installation
B. Download Hotfixes daily, and Service packs monthly, for each operating system
C. Configure Microsoft Update to run automatically on each host
D. Deliver updates from a local server through Windows Server Update Services
عرض الإجابة
اجابة صحيحة: D
السؤال #11
You work as a Network Administrator for Net World Inc. The company has a Linux-based network. You want to mount an SMBFS share from a Linux workstation. Which of the following commands can you use to accomplish the task? Each correct answer represents a complete solution. Choose two.
A. smbmount
B. mount smb
C. smbfsmount
D. mount -t smbfs
عرض الإجابة
اجابة صحيحة: AD
السؤال #12
How many bytes does it take to represent the hexadecimal value OxFEDCBA?
A. 12
B. 2
C. 3
D. 6
عرض الإجابة
اجابة صحيحة: C
السؤال #13
What requirement must an administrator remember when utilizing Security Configuration and Analysis (SCA) to apply security templates to Windows systems?
A. Template application requires domain administrator rights
B. Templates must be received from a domain controller
C. Template application should be done remotely
D. Template application cannot be automatically reversed
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following processes is known as sanitization?
A. Assessing the risk involved in discarding particular information
B. Verifying the identity of a person, network host, or system process
C. Physically destroying the media and the information stored on it
D. Removing the content from the media so that it is difficult to restore
عرض الإجابة
اجابة صحيحة: D
السؤال #15
An organization monitors the hard disks of its employees' computers from time to time. Which policy does this pertain to?
A. Privacy policy
B. Backup policy
C. User password policy
D. Network security policy
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: