لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
At an organization, unauthorized users have been accessing network resources via unused network wall jacks. Which of the following would be used to stop unauthorized access?
A. Configure port security
B. Configure spanning tree protocol
C. Configure loop protection
D. Configure an access list
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which of the following Acts enacted in United States allows the FBI to issue National Security Letters (NSLs) to Internet service providers (ISPs) ordering them to disclose records about their customers?
A. Computer Fraud and Abuse Act
B. Electronic Communications Privacy Act of 1986
C. Wiretap Act
D. Economic Espionage Act of 1996
عرض الإجابة
اجابة صحيحة: B
السؤال #3
What type of network attack uses switch spoofing?
A. VLAN hopping
B. DHCP snooping
C. Ping flooding
D. Double tagging
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Which of the following activities result in change requests? Each correct answer represents a complete solution. Choose all that apply.
A. Defect repair
B. Corrective actions
C. Preventive actions
D. Inspection
عرض الإجابة
اجابة صحيحة: ABC
السؤال #5
Which of the following is an example of pseudonymous data?
A. Encrypting employee data with a private key before transmitting it for payroll processing
B. Using salted hashes to protect customer bank account data in a backend database
C. Collected poll results added together and displayed in total on a public website
D. Research analysis with names removed and replaced with a unique identifier for each participant
عرض الإجابة
اجابة صحيحة: D
السؤال #6
The statement below is an example of which of the following? For consumer market product lines, no single supplier’s exposure will exceed 30%
A. Risk capacity
B. Risk tolerance
C. Risk analysis
D. Risk profile
عرض الإجابة
اجابة صحيحة: B
السؤال #7
An organization wants a perimeter device to inspect and transmit email requests from the internet to the internal email server. Which of the following is used for this purpose?
A. Web proxy
B. WAF
C. Reverse proxy
D. NIDS
عرض الإجابة
اجابة صحيحة: B
السؤال #8
S/MIME provides encryption for which of the following?
A. Email
B. VPN
C. Network authentication
D. Web applications
عرض الإجابة
اجابة صحيحة: A
السؤال #9
What can be determined from the NIST SP800-53 related screenshot below?
A. Previous Logon (Access) Notification is required in all baselines
B. Account Management must be implemented before Unsuccessful Logon Attempts
C. Session Lock has the most control enhancements
D. Account Management must be implemented before Separation of Duties
عرض الإجابة
اجابة صحيحة: D
السؤال #10
Which of the following is a recommended function of the SOC’s command center?
A. Approving and updating SOC policies
B. Receiving internal and third-party security requests
C. Managing network security monitoring devices
D. Performing forensic analysis and reverse engineering
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which of the following options is an approach to restricting system access to authorized users?
A. RBAC
B. MAC
C. DAC
D. MIC
عرض الإجابة
اجابة صحيحة: A
السؤال #12
PsPasswd is a tool used by network administrators to change an account password on the local or remote system. Which of the following are the command syntaxes used by the PsPasswd tool? Each correct answer represents a complete solution. Choose all that apply.
A. -t
B. NewPassword
C. -u
D. username
عرض الإجابة
اجابة صحيحة: BCD
السؤال #13
At which stage of the Security Awareness Maturity Model is annual training first implemented?
A. Long-term sustainment and cultural change
B. Metrics framework
C. Compliance-focused
D. Promoting awareness and behavioral change
عرض الإجابة
اجابة صحيحة: D
السؤال #14
Which of the following is an example of a compliance metric for a security awareness program?
A. Was there a decrease in the severity of incidents after the awareness program was initiated?
B. How many employees reported suspicious emails after awareness training compared to before training?
C. Which regulatory requirements will be addressed by deploying an organization wide awareness program?
D. What percentage of employees assigned to an awareness training module have completed the training?
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Using a network extraction approach for logging requires which of the following?
A. Scripts to parse multiple log formats
B. Sensors to capture mirrored traffic
C. System service configuration changes
D. System remote agents for log collection
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: