لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A company’s web filter is configured to scan the URL for strings and deny access when matches are found. Which of the following search strings should an analyst employ to prohibit access to nonencrypted websites?
A. ncryption=off\\
B. ttp://
C. ww
D. 443
عرض الإجابة
اجابة صحيحة: B
السؤال #2
During a security incident, the security operations team identified sustained network traffic from a malicious IP address: 10.1.4.9. A security analyst is creating an inbound firewall rule to block the IP address from accessing the organization’s network. Which of the following fulfills this request?
A. ccess-list inbound deny ig source 0
B. ccess-list inbound deny ig source 10
C. ccess-list inbound permit ig source 10
D. ccess-list inbound permit ig source 0
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which of the following is a primary security concern for a company setting up a BYOD program?
A. nd of life
B. uffer overflow
C. M escape
D. ailbreaking
عرض الإجابة
اجابة صحيحة: D
السؤال #4
A company is developing a business continuity strategy and needs to determine how many staff members would be required to sustain the business in the case of a disruption. Which of the following best describes this step?
A. apacity planning
B. edundancy
C. eographic dispersion
D. ablet exercise
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A company decided to reduce the cost of its annual cyber insurance policy by removing the coverage for ransomware attacks.Which of the following analysis elements did the company most likely use in making this decision?
A. MTTR
B. TO
C. RO
D. TBF
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A company is concerned about weather events causing damage to the server room and downtime. Which of the following should the company consider?
A. lustering servers
B. eographic dispersion
C. oad balancers
D. ff-site backups
عرض الإجابة
اجابة صحيحة: B
السؤال #7
The management team notices that new accounts that are set up manually do not always have correct access or permissions. Which of the following automation techniques should a systems administrator use to streamline account creation?
A. uard rail script
B. icketing workflow
C. scalation script
D. ser provisioning script
عرض الإجابة
اجابة صحيحة: D
السؤال #8
A security administrator would like to protect data on employees? laptops. Which of the following encryption techniques should the security administrator use?
A. artition
B. symmetric
C. ull disk
D. atabase
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which of the following tools can assist with detecting an employee who has accidentally emailed a file containing a customer’s PII?
A. CAP
B. et Flow
C. ntivirus
D. LP
عرض الإجابة
اجابة صحيحة: D
السؤال #10
An IT manager informs the entire help desk staff that only the IT manager and the help desk lead will have access to the administrator console of the help desk software. Which of the following security techniques is the IT manager setting up?
A. ardening
B. mployee monitoring
C. onfiguration enforcement
D. east privilege
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which of the following is the most likely outcome if a large bank fails an internal PCI DSS compliance assessment?
A. ines
B. udit findings
C. anctions
D. eputation damage
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A systems administrator is looking for a low-cost application-hosting solution that is cloud-based. Which of the following meets these requirements?
A. erverless framework
B. ype 1 hvpervisor
C. D-WAN
D. DN
عرض الإجابة
اجابة صحيحة: A
السؤال #13
A security team is reviewing the findings in a report that was delivered after a third party performed a penetration test. One of the findings indicated that a web application form field is vulnerable to cross-site scripting. Which of the following application security techniques should the security analyst recommend the developer implement to prevent this vulnerability?
A. ecure cookies
B. ersion control
C. nput validation
D. ode signing
عرض الإجابة
اجابة صحيحة: C
السؤال #14
An employee receives a text message that appears to have been sent by the payroll department and is asking for credential verification. Which of the following social engineering techniques are being attempted? (Choose two.)
A. thorough analysis of the supply chain
B. legally enforceable corporate acquisition policy
C. right to audit clause in vendor contracts and SOWs
D. n in-depth penetration test of all suppliers and vendors
عرض الإجابة
اجابة صحيحة: BE
السؤال #15
A software development manager wants to ensure the authenticity of the code created by the company. Which of the following options is the most appropriate?
A. esting input validation on the user input fields
B. erforming code signing on company-developed software
C. erforming static code analysis on the software
D. nsuring secure cookies are use
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which of the following scenarios describes a possible business email compromise attack?
A. n employee receives a gift card request in an email that has an executive's name in the display field of the email
B. mployees who open an email attachment receive messages demanding payment in order to access files
C. service desk employee receives an email from the HR director asking for log-in credentials to a cloud administrator account
D. n employee receives an email with a link to a phishing site that is designed to look like the company's email portal
عرض الإجابة
اجابة صحيحة: A
السؤال #17
A security practitioner completes a vulnerability assessment on a company’s network and finds several vulnerabilities, which the operations team remediates. Which of the following should be done next?
A. onduct an audit
B. nitiate a penetration test
C. escan the network
D. ubmit a report
عرض الإجابة
اجابة صحيحة: C
السؤال #18
A penetration tester begins an engagement by performing port and service scans against the client environment according to the rules of engagement. Which of the following reconnaissance types is the tester performing?
A. ctive
B. assive
C. efensive
D. ffensive
عرض الإجابة
اجابة صحيحة: A
السؤال #19
A newly appointed board member with cybersecurity knowledge wants the board of directors to receive a quarterly report detailing the number of incidents that impacted the organization. The systems administrator is creating a way to present the data to the board of directors. Which of the following should the systems administrator use?
A. acket captures
B. ulnerability scans
C. etadata
D. ashboard
عرض الإجابة
اجابة صحيحة: D
السؤال #20
A company’s legal department drafted sensitive documents in a SaaS application and wants to ensure the documents cannot be accessed by individuals in high-risk countries. Which of the following is the most effective way to limit this access?
A. ata masking
B. ncryption
C. eolocation policy
D. ata sovereignty regulation
عرض الإجابة
اجابة صحيحة: C
السؤال #21
A technician needs to apply a high-priority patch to a production system. Which of the following steps should be taken first?
A. o gather loCs for the investigation
B. o discover which systems have been affected
C. o eradicate any trace of malware on the network
D. o prevent future incidents of the same nature
عرض الإجابة
اجابة صحيحة: C
السؤال #22
A network manager wants to protect the company's VPN by implementing multifactor authentication that uses:. Something you know. Something you have. Something you areWhich of the following would accomplish the manager's goal?
A. omain name, PKI, GeolP lookup
B. PN IP address, company ID, facial structure
C. assword, authentication token, thumbprint
D. ompany URL, TLS certificate, home address
عرض الإجابة
اجابة صحيحة: C
السؤال #23
A systems administrator works for a local hospital and needs to ensure patient data is protected and secure. Which of the following data classifications should be used to secure patient data?
A. rivate
B. ritical
C. ensitive
D. ublic
عرض الإجابة
اجابة صحيحة: C
السؤال #24
Which of the following is the most likely to be used to document risks, responsible parties, and thresholds?
A. isk tolerance
B. isk transfer
C. isk register
D. isk analysis
عرض الإجابة
اجابة صحيحة: C
السؤال #25
An analyst is evaluating the implementation of Zero Trust principles within the data plane. Which of the following would be most relevant for the analyst to evaluate?
A. ecured zones
B. ubject role
C. daptive identity
D. hreat scope reduction
عرض الإجابة
اجابة صحيحة: D
السؤال #26
Which of the following has been implemented when a host-based firewall on a legacy Linux system allows connections from only specific internal IP addresses?
A. ompensating control
B. etwork segmentation
C. ransfer of risk
D. NMP traps
عرض الإجابة
اجابة صحيحة: A
السؤال #27
A security analyst and the management team are reviewing the organizational performance of a recent phishing campaign. The user click-through rate exceeded the acceptable risk threshold, and the management team wants to reduce the impact when a user clicks on a link in a phishing message. Which of the following should the analyst do?
A. lace posters around the office to raise awareness of common phishing activities
B. mplement email security filters to prevent phishing emails from being delivered
C. pdate the EDR policies to block automatic execution of downloaded programs
D. reate additional training for users to recognize the signs of phishing attempts
عرض الإجابة
اجابة صحيحة: C
السؤال #28
An enterprise is trying to limit outbound DNS traffic originating from its internal network. Outbound DNS requests will only be allowed from one device with the IP address 10.50.10.25. Which of the following firewall ACLs will accomplish this goal?
A. ccess list outbound permit 0
B. ccess list outbound permit 0
C. ccess list outbound permit 0
D. ccess list outbound permit 10
عرض الإجابة
اجابة صحيحة: D
السؤال #29
An employee clicked a link in an email from a payment website that asked the employee to update contact information. The employee entered the log-in information but received a?page not found? error message. Which of the following types of social engineering attacks occurred?
A. rand impersonation
B. retexting
C. yposquatting
D. hishing
عرض الإجابة
اجابة صحيحة: D
السؤال #30
Which of the following vulnerabilities is exploited when an attacker overwrites a register with a malicious address?
A. M escape
B. QL injection
C. uffer overflow
D. ace condition
عرض الإجابة
اجابة صحيحة: C
السؤال #31
Which of the following threat actors is the most likely to be hired by a foreign government to attack critical systems located in other countries?
A. acktivist
B. histleblower
C. rganized crime
D. nskilled attacker
عرض الإجابة
اجابة صحيحة: C
السؤال #32
Which of the following would be the best way to handle a critical business application that is running on a legacy server?
A. egmentation
B. solation
C. ardening
D. ecommissioning
عرض الإجابة
اجابة صحيحة: C
السؤال #33
An administrator notices that several users are logging in from suspicious IP addresses. After speaking with the users, the administrator determines that the employees were not logging in from those IP addresses and resets the affected users? passwords. Which of the following should the administrator implement to prevent this type of attack from succeeding in the future?
A. ultifactor authentication
B. ermissions assignment
C. ccess management
D. assword complexity
عرض الإجابة
اجابة صحيحة: A
السؤال #34
An organization recently updated its security policy to include the following statement:Regular expressions are included in source code to remove special characters such as $, |, ;. &, `, and? from variables set by forms in a web application. Which of the following best explains the security technique the organization adopted by making this addition to the policy?
A. dentify embedded keys
B. ode debugging
C. nput validation
D. tatic code analysis
عرض الإجابة
اجابة صحيحة: C
السؤال #35
A company requires hard drives to be securely wiped before sending decommissioned systems to recycling. Which of the following best describes this policy?
A. numeration
B. anitization
C. estruction
D. nventory
عرض الإجابة
اجابة صحيحة: B
السؤال #36
Which of the following should a security administrator adhere to when setting up a new set of firewall rules?
A. isaster recovery plan
B. ncident response procedure
C. usiness continuity plan
D. hange management procedure
عرض الإجابة
اجابة صحيحة: D
السؤال #37
HOTSPOT (Drag and Drop is not supported)Select the appropriate attack and remediation from each drop-down list to label the corresponding attack with its remediation.INSTRUCTIONSNot all attacks and remediation actions will be used. If at any time you would like to bring back the initial state of the simulation, please click the Reset All button.
A. ee Explanation section for answer
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: