لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
What do host-based firewalls protect workstations from?
A. ero-day vulnerabilities
B. alicious web scripts
C. nwanted traffic
D. iruses
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which element is included in an incident response plan as stated in NIST.SP800-61?
A. pproval of senior management
B. ecurity of sensitive information
C. ndividual approach to incident response
D. onsistent threat identification
عرض الإجابة
اجابة صحيحة: D
السؤال #3
What is a difference between inline traffic interrogation and traffic mirroring?
A. nline inspection acts on the original traffic data flow
B. raffic mirroring passes live traffic to a tool for blocking
C. raffic mirroring inspects live traffic for analysis and mitigation
D. nline traffic copies packets for analysis and security
عرض الإجابة
اجابة صحيحة: A
السؤال #4
What should a security analyst consider when comparing inline traffic interrogation with traffic tapping to determine which approach to use in the network?
A. apping interrogation replicates signals to a separate port for analyzing traffic
B. apping interrogations detect and block malicious traffic
C. nline interrogation enables viewing a copy of traffic to ensure traffic is in compliance with security policies
D. nline interrogation detects malicious traffic but does not block the traffic
عرض الإجابة
اجابة صحيحة: A
السؤال #5
During which phase of the forensic process are tools and techniques used to extract information from the collected data?
A. xamination
B. ollection
C. eporting
D. nvestigation
عرض الإجابة
اجابة صحيحة: A
السؤال #6
A network engineer noticed in the NetFlow report that internal hosts are sending many DNS requests to external DNS servers. ASOC analyst checked the endpoints and discovered that they are infected and became part of the botnet. Endpoints are sending multiple DNS requests, but with spoofed IP addresses of valid external sources. What kind of attack are infected endpoints involved in?
A. NS flooding
B. NS hijacking
C. NS amplification
D. NS tunneling
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which statement describes patch management?
A. canning servers and workstations for missing patches and vulnerabilities
B. rocess of appropriate distribution of system or software updates
C. anaging and keeping previous patches lists documented for audit purposes
D. orkflow of distributing mitigations of newly found vulnerabilities
عرض الإجابة
اجابة صحيحة: A
السؤال #8
What is the difference between statistical detection and rule-based detection models?
A. ule-based detection involves the collection of data in relation to the behavior of legitimate users over a period of time
B. tatistical detection defines legitimate data of users over a period of time and rule-based detection defines it on an IF/THEN basis
C. tatistical detection involves the evaluation of an object on its intended actions before it executes that behavior
D. ule-based detection defines legitimate data of users over a period of time and statistical detection defines it on an IF/THEN basis
عرض الإجابة
اجابة صحيحة: B
السؤال #9
What are the two differences between stateful and deep packet inspection? (Choose two.)
A. tateful inspection is capable of packet data inspections, and deep packet inspection is not
B. eep packet inspection is capable of malware blocking, and stateful inspection is not
C. eep packet inspection operates on Layer 3 and 4, and stateful inspection operates on Layer 3 of the OSI model
D. tateful inspection is capable of TCP state tracking, and deep packet filtering checks only TCP source and destination ports
E. eep packet inspection is capable of TCP state monitoring only, and stateful inspection can inspect TCP and UDP
عرض الإجابة
اجابة صحيحة: BE
السؤال #10
What is the difference between deep packet inspection and stateful inspection?
A. tateful inspection is more secure due to its complex signatures, and deep packet inspection requires less human intervention
B. eep packet inspection gives insights up to Layer 7, and stateful inspection gives insights only up to Layer 4
C. tateful inspection verifies data at the transport layer, and deep packet inspection verifies data at the application layer
D. eep packet inspection is more secure due to its complex signatures, and stateful inspection requires less human intervention
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: