لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An organization's network administrator uncovered a rogue device on the network that is emulating the charactenstics of a switch. The device is trunking protocols and inserting tagging va the flow of traffic at the data link layer Which of the following BEST describes this attack?
A. VLAN hopping
B. Injection attack
C. Spoofing
D. DNS pharming
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A contained section of a building is unable to connect to the Internet A security analyst. A security analyst investigates me issue but does not see any connections to the corporate web proxy However the analyst does notice a small spike in traffic to the Internet. The help desk technician verifies all users are connected to the connect SSID. but there are two of the same SSIDs listed in the network connections. Which of the following BEST describes what is occurring?
A. Bandwidth consumption
B. Denial of service
C. Beaconing
D. Rogue device on the network
عرض الإجابة
اجابة صحيحة: AC
السؤال #3
A Chief Information Security Officer (CISO) is concerned about new privacy regulations that apply to the company. The CISO has tasked a security analyst with finding the proper control functions to verity that a user's data is not altered without the user's consent Which of the following would be an appropriate course of action?
A. Use a DLP product to monitor the data sets for unauthorized edits and changes
B. Use encryption first and then hash the data at regular, defined times
C. Automate the use of a hashing algorithm after verified users make changes to their data
D. Replicate the data sets at regular intervals and continuously compare the copies for unauthorized changes
عرض الإجابة
اجابة صحيحة: A
السؤال #4
The steering committee for information security management annually reviews the security incident register for the organization to look for trends and systematic issues The steering committee wants to rank the risks based on past incidents to improve the security program for next year Below is the incident register for the organization. Which of the following should the organization consider investing in FIRST due to the potential impact of availability?
A. Hire a managed service provider to help with vulnerability management
B. Build a warm site in case of system outages
C. Invest in a failover and redundant system, as necessary
D. Hire additional staff for the IT department to assist with vulnerability management and log review
عرض الإجابة
اجابة صحيحة: D
السؤال #5
A company's security officer needs to implement geographical IP blocks for nation-state actors from a foreign country On which of the following should the blocks be implemented'?
A. Web content filter
B. Access control list
C. Network access control
D. Data loss prevention
عرض الإجابة
اجابة صحيحة: B
السؤال #6
A company wants to ensure confidential data from its storage media files is sanitized so the drives cannot oe reused. Which of the following is the BEST approach?
A. Degaussing
B. Shredding
C. Formatting
D. Encrypting
عرض الإجابة
اجابة صحيحة: E
السؤال #7
An information security analyst is reviewing backup data sets as part of a project focused on eliminating archival data sets. Which of the following should be considered FIRST prior to disposing of the electronic data?
A. Sanitization policy
B. Data sovereignty
C. Encryption policy
D. Retention standards
عرض الإجابة
اجابة صحيحة: A
السؤال #8
While investigating an incident in a company's SIEM console, a security analyst found hundreds of failed SSH login attempts, which all occurred in rapid succession. The failed attempts were followed by a successful login on the root user Company policy allows systems administrators to manage their systems only from the company's internal network using their assigned corporate logins. Which of the following are the BEST actions the analyst can take to stop any further compromise? (Select TWO).
A. Configure /etc/sshd_config to deny root logins and restart the SSHD service
B. Add a rule on the network IPS to block SSH user sessions
C. Configure /etc/passwd to deny root logins and restart the SSHD service
D. Reset the passwords for all accounts on the affected system
E. Add a rule on the perimeter firewall to block the source IP address
F. Add a rule on the affected system to block access to port TCP/22
عرض الإجابة
اجابة صحيحة: D
السؤال #9
While implementing a PKI for a company, a security analyst plans to utilize a dedicated server as the certAcate authority that is only used to sign intermediate certificates. Which of the following are the MOST secure states for the certificate authority server when it is not in use? (Select TWO)
A. On a private VLAN
B. Full disk encrypted
C. Powered off
D. Backed up hourly
E. VPN accessible only
F. Air gapped
عرض الإجابة
اجابة صحيحة: B
السؤال #10
A company's blocklist has outgrown the current technologies in place. The ACLS are at maximum, and the IPS signatures only allow a certain amount of space for domains to be added, creating the need for multiple signatures. Which of the following configuration changes to the existing controls would be the MOST appropriate to improve performance?
A. Create an IDS for the current blocklist to determine which domains are showing activity and may need to be removed
B. Implement a host-file based solution that will use a list of all domains to deny for all machines on the network
C. Review the current blocklist to determine which domains can be removed from the list and then update the ACLs and IPS signatures
D. Review the current blocklist and prioritize it based on the level of threat severit
E. Add the domains with the highest severity to the blocklist and remove the lower-severity threats from it
عرض الإجابة
اجابة صحيحة: A
السؤال #11
The SFTP server logs show thousands of failed login attempts from hundreds of IP addresses worldwide. Which of the following controls would BEST protect the service?
A. Whitelisting authorized IP addresses
B. Enforcing more complex password requirements
C. Blacklisting unauthorized IP addresses
D. Establishing a sinkhole service
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A threat feed notes malicious actors have been infiltrating companies and exfiltration data to a specific set of domains Management at an organization wants to know if it is a victim Which of the following should the security analyst recommend to identity this behavior without alerting any potential malicious actors?
A. Create an IPS rule to block these domains and trigger an alert within the SIEM tool when these domains are requested
B. Add the domains to a DNS sinkhole and create an alert m the SIEM toot when the domains are queried
C. Look up the IP addresses for these domains and search firewall logs for any traffic being sent to those IPs over port 443
D. Query DNS logs with a SIEM tool for any hosts requesting the malicious domains and create alerts based on this information
عرض الإجابة
اجابة صحيحة: E
السؤال #13
A security analyst is investigating an incident that appears to have started with SOL injection against a publicly available web application. Which of the following is the FIRST step the analyst should take to prevent future attacks?
A. Modify the IDS rules to have a signature for SQL injection
B. Take the server offline to prevent continued SQL injection attacks
C. Create a WAF rule In block mode for SQL injection
D. Ask the developers to implement parameterized SQL queries
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following secure coding techniques can be used to prevent cross-site request forgery attacks?
A. Input validation
B. Output encoding
C. Parameterized queries
D. Tokenization
عرض الإجابة
اجابة صحيحة: D
السؤال #15
An application server runs slowly and then triggers a high CPU alert. After investigating, a security analyst finds an unauthorized program is running on the server. The analyst reviews the application log below. Which of the following conclusions is supported by the application log?
A. An attacker was attempting to perform a buffer overflow attack to execute a payload in memory
B. An attacker was attempting to perform an XSS attack via a vulnerable third-party library
C. An attacker was attempting to download files via a remote command execution vulnerability
D. An attacker was attempting to perform a DoS attack against the server
عرض الإجابة
اجابة صحيحة: D
السؤال #16
A security analyst receives a CVE bulletin, which lists several products that are used in the enterprise. The analyst immediately deploys a critical security patch. Which of the following BEST describes the reason for the analyst's immediate action?
A. A known exploit was discovered
B. There is an insider threat
C. Nation-state hackers are targeting the region
D. A new zero-day threat needs to be addressed
E. A new vulnerability was discovered by a vendor
عرض الإجابة
اجابة صحيحة: A
السؤال #17
An analyst needs to provide recommendations for the AUP Which of the following is the BEST recommendation to protect the company's intellectual property?
A. Company assets must be stored in a locked cabinet when not in use
B. Company assets must not be utilized for personal use or gain
C. Company assets should never leave the company's property
D. AII Internet access must be via a proxy server
عرض الإجابة
اجابة صحيحة: C
السؤال #18
An information security analyst on a threat-hunting team Is working with administrators to create a hypothesis related to an internally developed web application The working hypothesis is as follows: ? Due to the nature of the industry, the application hosts sensitive data associated with many clients and Is a significant target. ? The platform Is most likely vulnerable to poor patching and Inadequate server hardening, which expose vulnerable services. ? The application is likely to be targeted with SQL inj
A. Improving detection capabilities
B. Bundling critical assets
C. Profiling threat actors and activities
D. Reducing the attack surface area
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: