لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A security strategy in which several protection layers are placed throughout an information system helps to prevent direct attacks against an information system and data because a break in one layer only leads the attacker to the next layer. What is this security strategy called?
A. etwork Security Zoning
B. efense in Depth
C. ulti-aspect Model
D. hreat Modeling
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following attack allows attackers to bypass client-ID security mechanisms and gain access privileges, and then inject malicious scripts into specific web pages?
A. ross-Site Scripting (XSS)
B. uffer Overflow
C. enial-of-Service
D. arameter/Form Tampering
عرض الإجابة
اجابة صحيحة: A
السؤال #3
The security of the network can be increased in a number of ways, for instance, by installing a special kind of web server and through packet filtering. What type of server is implemented as an intermediary server between a client and a server to act as a shield and protect and hide the computer from the outside network?
A. pplication Server
B. elnet Server
C. eb Server
D. roxy Server
عرض الإجابة
اجابة صحيحة: D
السؤال #4
An algorithm which is a part of the U.S. government's long-term project to develop a set of standards for publicly available cryptography as authorized by the Computer Security Act of 1987 accepts a message of 264 bits in length and a 160-bit message output digest is produced to complicate text searching. Which of the following algorithms is a family of two similar hash functions, with different block sizes, and uses 32-bit words and 64-bit words?
A. HA-2
B. HA-0
C. HA-1
D. HA-3
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Jason, a cybercriminal, sells illegal articles on the Internet. Which of the following activities is Jason involved in?
A. Cyberstalking
B. Cyberterrorism
C. Cybertrespass
D. Internet pharmacies
عرض الإجابة
اجابة صحيحة: D
السؤال #6
In a complex network, Router transfers data packets by observing some form of parameters or metrics provided in the routing table. Which of the following metrics is NOT included in the routing table?
A. Bandwidth
B. Delay
C. Load
D. Frequency
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A firewall is a combination of hardware and software, used to provide security to a network.It is used to protect an internal network or intranet against unauthorized access from theInternet or other outside networks. It restricts inbound and outbound access and can analyze all traffic between an internal network and the Internet. Users can configure a firewall to pass or block packets from specific IP addresses and ports. Which of the following tools works as a firewall for the Linux 2.4 kernel?
A. Stunnel
B. IPTables
C. OpenSSH
D. IPChains
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which of the following terms is used for the process of securing a system or a device on a network infrastructure?
A. Hardening
B. Sanitization
C. Authentication
D. Cryptography
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Fill in the blank with the command to complete the statement below. Do not enter the full path of the command.The __________ command is used to remove the print jobs that have been queued for printing by using a secure connection.
A. lprm -E
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which of the following Intrusion Detection Systems (IDS) is used to monitor rogue access points and the use of wireless attack tools?
A. Snort 2
B. WIDS
C. NFR security
D. LogIDS 1
عرض الإجابة
اجابة صحيحة: B
السؤال #11
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. John notices that the We-are-secure network is vulnerable to a man-in-the-middle attack since the key exchange process of the cryptographic algorithm it is using does not authenticate participants. Which of the following cryptographic algorithms is being used by the We-are-secure server?
A. RSA
B. Twofish
C. Blowfish
D. Diffie-Hellman
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Andrew, a bachelor student of Faulkner University, creates a gmail account. He uses'Faulkner' as the password for the gmail account. After a few days, he starts receiving a lot of e-mails stating that his gmail account has been hacked. He also finds that some of his important mails have been deleted by someone. Which of the following methods has the attacker used to crack Andrew's password?Each correct answer represents a complete solution. Choose all that apply.
A. Zero-day attack
B. Social engineering
C. Rainbow attack
D. Buffer-overflow attack
E. Brute force attack
F. Dictionary-based attack
G. Denial-of-service (DoS) attack
H. Password guessing
عرض الإجابة
اجابة صحيحة: BCEFGH
السؤال #13
Which of the following software helps in protecting the computer against pop-ups, slow performance, and security threats caused by spyware and other unwanted software?Each correct answer represents a complete solution. Choose all that apply.
A. BitDefender
B. Windows Defender
C. John the Ripper
D. THC Hydra
عرض الإجابة
اجابة صحيحة: AB
السؤال #14
A digital signature is a type of public key cryptography. Which of the following statements are true about digital signatures?Each correct answer represents a complete solution. Choose all that apply.
A. In order to digitally sign an electronic record, a person must use his/her public key
B. In order to verify a digital signature, the signer's private key must be used
C. In order to verify a digital signature, the signer's public key must be used
D. In order to digitally sign an electronic record, a person must use his/her private key
عرض الإجابة
اجابة صحيحة: CD
السؤال #15
Andrew works as a Forensic Investigator for Passguide Inc. The company has a Windows- based environment. The company's employees use Microsoft Outlook Express as their e- mail client program. E-mails of some employees have been deleted due to a virus attack on the network.Andrew is therefore assigned the task to recover the deleted mails. Which of the following tools can Andrew use to accomplish the task?Each correct answer represents a complete solution. Choose two.
A. FINALeMAIL
B. eMailTrackerPro
C. EventCombMT
D. R-mail
عرض الإجابة
اجابة صحيحة: AD
السؤال #16
Which of the following Incident handling process phases is responsible for defining rules, collaborating human workforce, creating a back-up plan, and testing the plans for an enterprise?
A. Eradication phase
B. Preparation phase
C. Recovery phase
D. Identification phase
E. Containment phase
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Each correct answer represents a complete solution. Choose two.
A. Modem
B. Console
C. Sensor
D. Gateway
E. Firewall
عرض الإجابة
اجابة صحيحة: BC
السؤال #18
Which of the following honeypots is a low-interaction honeypot and is used by companies or corporations for capturing limited information about malicious hackers?
A. Production honeypot
B. Research honeypot
C. Honeynet
D. Honeyfarm
عرض الإجابة
اجابة صحيحة: A
السؤال #19
You work as a Network Administrator for Tech Perfect Inc. The company has a WindowsActive Directory-based single domain single forest network. The functional level of the forest is Windows Server 2003. The company has recently provided fifty laptops to its sales network for the laptops.The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user.You ar
A. Configure the wireless network to use WEP encryption for the data transmitted over a wireless network
B. Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only
C. Implement the open system authentication for the wireless network
D. Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only
E. Implement the IEEE 802
عرض الإجابة
اجابة صحيحة: ADE

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: