لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following is a technique of using a modem to automatically scan a list of telephone numbers, usually dialing every number in a local area code to search for computers, Bulletin board systems, and fax machines?
A. Warkitting
B. War driving
C. Wardialing
D. Demon dialing
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Sarah works as a Web Developer for XYZ CORP. She is creating a Web site for her company. Sarah wants greater control over the appearance and presentation of Web pages. She wants the ability to precisely specify the display attributes and the appearance of elements on the Web pages. How will she accomplish this?
A. Use the Database Design wizard
B. Make two templates, one for the index page and the other for all other pages
C. Use Cascading Style Sheet (CSS)
D. Make a template and use it to create each Web page
عرض الإجابة
اجابة صحيحة: C
السؤال #3
You work as a Network Administrator for Blue Well Inc. The company has a TCP/IP-based routed network. Two segments have been configured on the network as shown below: One day, the switch in Subnet B fails. What will happen?
A. Communication between the two subnets will be affected
B. The whole network will collapse
C. Workstations on Subnet A will become offline
D. Workstations on Subnet B will become offline
عرض الإجابة
اجابة صحيحة: AD
السؤال #4
You work as the Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. You are a root user on the Red Hat operating system. You want to keep an eye on the system log file /var/adm/messages. Which of the following commands should you use to read the file in real time?
A. tail -n 3 /var/adm/messages
B. tail -f /var/adm/messages
C. cat /var/adm/messages
D. tail /var/adm/messages
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Mark works as a Web Designer for XYZ CORP. The company has a Windows-based network. Mark creates an HTML document that gives the following error on execution: "These hypertext system features are not supported by HTML". Which of the following can be the hypertext system features that are NOT supported by HTML? (Choose three)
A. Source tracking
B. Typed link
C. Hyperlink
D. Fat link
عرض الإجابة
اجابة صحيحة: ABD
السؤال #6
What are the different categories of PL/SQL program units?
A. Default
B. Unnamed
C. Primary
D. Named
عرض الإجابة
اجابة صحيحة: BD
السؤال #7
John works as a contract Ethical Hacker. He has recently got a project to do security checking for www.we-are-secure.com. He wants to find out the operating system of the we-are-secure server in the information gathering step. Which of the following commands will he use to accomplish the task? (Choose two)
A. nc 208
B. nmap -v -O www
C. nc -v -n 208
D. nmap -v -O 208
عرض الإجابة
اجابة صحيحة: BD
السؤال #8
Which of the following is the default port for Hypertext Transfer Protocol (HTTP)?
A. 20
B. 443
C. 80
D. 21
عرض الإجابة
اجابة صحيحة: C
السؤال #9
You work as a Network Administrator for NetTech Inc. Your computer has the Windows 2000 Server operating system. You want to harden the security of the server. Which of the following changes are required to accomplish this? (Choose two)
A. Remove the Administrator account
B. Disable the Guest account
C. Rename the Administrator account
D. Enable the Guest account
عرض الإجابة
اجابة صحيحة: BC
السؤال #10
In which of the following is absolute size of frames expressed?
A. Bits
B. Percentage
C. Inches
D. Pixels
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which of the following is a type of web site monitoring that is done using web browser emulation or scripted real web browsers?
A. Route analytics
B. Passive monitoring
C. Network tomography
D. Synthetic monitoring
عرض الإجابة
اجابة صحيحة: D
السؤال #12
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He wants to use Kismet as a wireless sniffer to sniff the We-are-secure network. Which of the following IEEE-based traffic can be sniffed with Kismet?
A. 802
B. 802
C. 802
D. 802
عرض الإجابة
اجابة صحيحة: ABCD
السؤال #13
What does CSS stand for?
A. Cascading Style Sheet
B. Coded System Sheet
C. Cyclic Style Sheet
D. Cascading Style System
عرض الإجابة
اجابة صحيحة: A
السؤال #14
You work as a Network Administrator for XYZ CORP. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest single domain network. You have installed a Windows Server 2008 computer. You have configured auditing on this server. The client computers of the company use the Windows XP Professional operating system. You want to audit each event that is related to a user managing an account in the user database on the computer where the
A. Access to an Active Directory object
B. Change of password for a user account
C. Addition of a user account to a group
D. Creation of a user account
عرض الإجابة
اجابة صحيحة: BCD
السؤال #15
Which of the following types of firewall functions at the Session layer of OSI model?
A. Packet filtering firewall
B. Circuit-level firewall
C. Switch-level firewall
D. Application-level firewall
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: