لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
At a meeting, the systems administrator states the security controls a company wishes to implement seem excessive, since all of the information on the company’s web servers can be obtained publicly and is not proprietary in any way. The next day the company’s website is defaced as part of an SQL injection attack, and the company receives press inquiries about the message the attackers displayed on the website. Which of the following is the FIRST action the company should take?
A. Refer to and follow procedures from the company’s incident response plan
B. Call a press conference to explain that the company has been hacked
C. Establish chain of custody for all systems to which the systems administrator has access
D. Conduct a detailed forensic analysis of the compromised system
E. Inform the communications and marketing department of the attack detail
عرض الإجابة
اجابة صحيحة: BD
السؤال #2
A security engineer is working with a software development team. The engineer is tasked with ensuring all security requirements are adhered to by the developers. Which of the following BEST describes the contents of the supporting document the engineer is creating?
A. A series of ad-hoc tests that each verify security control functionality of the entire system at once
B. A series of discrete tasks that, when viewed in total, can be used to verify and document each individual constraint from the SRTM
C. A set of formal methods that apply to one or more of the programing languages used on the development project
D. A methodology to verify each security control in each unit of developed code prior to committing the code
عرض الإجابة
اجابة صحيحة: BE
السؤال #3
The Chief Information Officer (CIO) wants to increase security and accessibility among the organization’s cloud SaaS applications. The applications are configured to use passwords, and twofactor authentication is not provided natively. Which of the following would BEST address the CIO’s concerns?
A. Procure a password manager for the employees to use with the cloud applications
B. Create a VPN tunnel between the on-premises environment and the cloud providers
C. Deploy applications internally and migrate away from SaaS applications
D. Implement an IdP that supports SAML and time-based, one-time password
عرض الإجابة
اجابة صحيحة: B
السؤال #4
While attending a meeting with the human resources department, an organization’s information security officer sees an employee using a username and password written on a memo pad to log into a specific service. When the information security officer inquires further as to why passwords are being written down, the response is that there are too many passwords to remember for all the different services the human resources department is required to use. Additionally, each password has specific complexity requir
A. Utilizing MFA
B. Implementing SSO
C. Deploying 802
D. Pushing SAML adoption
E. Implementing TACACS
عرض الإجابة
اجابة صحيحة: A
السؤال #5
The administrator is troubleshooting availability issues on an FCoE-based storage array that uses deduplication. The single controller in the storage array has failed, so the administrator wants to move the drives to a storage array from a different manufacturer in order to access the data. Whichof the following issues may potentially occur?
A. The data may not be in a usable format
B. The new storage array is not FCoE based
C. The data may need a file system check
D. The new storage array also only has a single controlle
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: