لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Thomas, an employee of an organization, is restricted to access specific websites from his office system. He is trying to obtain admin credentials to remove the restrictions. While waiting for an opportunity, he sniffed communication between the administrator and an application server to retrieve the admin credentials. Identify the type of attack performed by Thomas in the above scenario.
A. ishing
B. avesdropping
C. hishing
D. umpster diving
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Kayden successfully cracked the final round of interview at an organization. After few days, he received his offer letter through an official company email address. The email stated that the selected candidate should respond within a specified time. Kayden accepted the opportunity and provided e-signature on the offer letter, then replied to the same email address. The company validated the e-signature and added his details to their database. Here, Kayden could not deny company's message, and company could
A. vailability
B. on-repudiation
C. ntegrity
D. onfidentiality
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Sam, a software engineer, visited an organization to give a demonstration on a software tool that helps in business development. The administrator at the organization created a least privileged account on a system and allocated that system to Sam for the demonstration. Using this account, Sam can only access the files that are required for the demonstration and cannot open any other file in the system.Which of the following type of accounts the organization has given to Sam in the above scenario?
A. ervice account
B. uest account
C. ser account
D. dministrator account
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Myles, a security professional at an organization, provided laptops for all the employees to carry out the business processes from remote locations. While installing necessary applications required for the business, Myles has also installed antivirus software on each laptop following the company's policy to detect and protect the machines from external malicious events over the Internet.Identify the PCI-DSS requirement followed by Myles in the above scenario.
A. CI-DSS requirement no 1
B. CI-DSS requirement no 1
C. CI-DSS requirement no 5
D. CI-DSS requirement no 1
عرض الإجابة
اجابة صحيحة: C
السؤال #5
John works as a C programmer. He develops the following C program:His program is vulnerable to a __________ attack.
A. QL injection
B. enial-of-Service
C. uffer overflow
D. ross site scripting
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
A. equence Number
B. eader Length
C. cknowledgment Number
D. ource Port Address
عرض الإجابة
اجابة صحيحة: AC
السؤال #7
Bonney's system has been compromised by a gruesome malware.What is the primary step that is advisable to Bonney in order to contain the malware incident from spreading?
A. omplaint to police in a formal way regarding the incident
B. urn off the infected machine
C. eave it to the network administrators to handle
D. all the legal department in the organization and inform about the incident
عرض الإجابة
اجابة صحيحة: B
السؤال #8
According to the forensics investigation process, what is the next step carried out right after collecting the evidence?
A. reate a Chain of Custody Document
B. end it to the nearby police station
C. et a Forensic lab
D. all Organizational Disciplinary Team
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Which one of the following is the correct flow for Setting Up a Computer Forensics Lab?
A. lanning and budgeting –> Physical location and structural design considerations –> Work area considerations –> Human resource considerations –> Physical security recommendations –> Forensics lab licensing
B. lanning and budgeting –> Physical location and structural design considerations–> Forensics lab licensing –> Human resource considerations –> Work area considerations –> Physical security recommendations
C. lanning and budgeting –> Forensics lab licensing –> Physical location and structural design considerations –> Work area considerations –> Physical security recommendations –> Human resource considerations
D. lanning and budgeting –> Physical location and structural design considerations –> Forensics lab licensing –>Work area considerations –> Human resource considerations –> Physical security recommendations
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which of the following directory will contain logs related to printer access?
A. var/log/cups/Printer_log file
B. var/log/cups/access_log file
C. var/log/cups/accesslog file
D. var/log/cups/Printeraccess_log file
عرض الإجابة
اجابة صحيحة: A
السؤال #11
When an investigator contacts by telephone the domain administrator or controller listed by a Who is lookup to request all e-mails sent and received for a user account be preserved, what U.S.C. statute authorizes this phone call and obligates the ISP to preserve e-mail records?
A. itle 18, Section 1030
B. itle 18, Section 2703(d)
C. itle 18, Section Chapter 90
D. itle 18, Section 2703(f)
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: