لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Jonathan being a keen administrator has followed all of the best practices he could find on securing his Windows Server. He renamed the Administrator account to a new name that can't be easily guessed but there remain people who attempt to compromise his newly renamed administrator account. How can a remote attacker decipher the name of the administrator account if it has been renamed?
A. The attacker guessed the new name
B. The attacker used the user2sid program
C. The attacker used to sid2user program
D. The attacker used NMAP with the V option
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A large company intends to use Blackberry for corporate mobile phones and a security analyst is assigned to evaluate the possible threats. The analyst will use the Blackjacking attack method to demonstrate how an attacker could circumvent perimeter defenses and gain access to the corporate network. What tool should the analyst use to perform a Blackjacking attack?
A. Paros Proxy
B. BBProxy
C. BBCrack
D. Blooover
عرض الإجابة
اجابة صحيحة: B
السؤال #3
If you want to only scan fewer ports than the default scan using Nmap tool, which option would you use?
A. -r
B. -F
C. -P
D. -sP
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which of the following Google advanced search operators helps an attacker in gathering information about websites that are similar to a specified target URL?
A. [inurl:]
B. [info:]
C. [site:]
D. [related:]
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which is the first step followed by Vulnerability Scanners for scanning a network?
A. OS Detection
B. Firewall detection
C. TCP/UDP Port scanning
D. Checking if the remote host is alive
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Passive reconnaissance involves collecting information through which of the following?
A. Social engineering
B. Network traffic sniffing
C. Man in the middle attacks
D. Publicly accessible sources
عرض الإجابة
اجابة صحيحة: D
السؤال #7
John is investigating web-application firewall logs and observers that someone is attempting to inject the following: What type of attack is this?
A. SQL injection
B. Buffer overflow
C. CSRF
D. XSS
عرض الإجابة
اجابة صحيحة: B
السؤال #8
John is investigating web-application firewall logs and observers that someone is attempting to inject the following: What type of attack is this?
A. SQL injection
B. Buffer overflow
C. CSRF
D. XSS
عرض الإجابة
اجابة صحيحة: B
السؤال #9
In Wireshark, the packet bytes panes show the data of the current packet in which format?
A. Decimal
B. ASCII only
C. Binary
D. Hexadecimal
عرض الإجابة
اجابة صحيحة: D
السؤال #10
John, a professional hacker, performs a network attack on a renowned organization and gains unauthorized access to the target network. He remains in the network without being detected for a long time and obtains sensitive information without sabotaging the organization. Which of the following attack techniques is used by John?
A. Insider threat
B. Diversion theft
C. Spear-phishing sites
D. Advanced persistent threat
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which of the following programs is usually targeted at Microsoft Office products?
A. Polymorphic virus
B. Multipart virus
C. Macro virus
D. Stealth virus
عرض الإجابة
اجابة صحيحة: C
السؤال #12
A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client. What is a possible source of this problem?
A. The WAP does not recognize the client's MAC address
B. The client cannot see the SSID of the wireless network
C. Client is configured for the wrong channel
D. The wireless client is not configured to use DHCP
عرض الإجابة
اجابة صحيحة: A
السؤال #13
This asymmetry cipther is based on factoring the product of two large prime numbers. What cipher is described above?
A. SHA
B. RC5
C. RSA
D. MD5
عرض الإجابة
اجابة صحيحة: C
السؤال #14
A new wireless client is configured to join a 802.11 network. This client uses the same hardware and software as many of the other clients on the network. The client can see the network, but cannot connect. A wireless packet sniffer shows that the Wireless Access Point (WAP) is not responding to the association requests being sent by the wireless client. What is a possible source of this problem?
A. The WAP does not recognize the client?€?s MAC address
B. The client cannot see the SSID of the wireless network
C. Client is configured for the wrong channel
D. The wireless client is not configured to use DHCP
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A. Restore a random file
B. Perform a full restore
C. Read the first 512 bytes of the tape
D. Read the last 512 bytes of the tape
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Passive reconnaissance involves collecting information through which of the following?
A. Social engineering
B. Network traffic sniffing
C. Man in the middle attacks
D. Publicly accessible sources
عرض الإجابة
اجابة صحيحة: D
السؤال #17
Which of the following is the best countermeasure to encrypting ransomwares?
A. Use multiple antivirus softwares
B. Keep some generation of off-line backup
C. Analyze the ransomware to get decryption key of encrypted data
D. Pay a ransom
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Which of the following programs is usually targeted at Microsoft Office products?
A. Polymorphic virus
B. Multipart virus
C. Macro virus
D. Stealth virus
عرض الإجابة
اجابة صحيحة: C
السؤال #19
You are a penetration tester working to test the user awareness of the employees of the client XYZ. You harvested two employees’ emails from some public sources and are creating a client-side backdoor to send it to the employees via email. Which stage of the cyber kill chain are you at?
A. Reconnaissance
B. Weaponization
C. Command and control
D. Exploitation
عرض الإجابة
اجابة صحيحة: B
السؤال #20
Sophia travels a lot and worries that her laptop containing confidential documents might be stolen. What is the best protection that will work for her?
A. Full Disk encryption
B. BIOS password
C. Hidden folders
D. Password protected files
عرض الإجابة
اجابة صحيحة: A
السؤال #21
Which of the following is the best countermeasure to encrypting ransomwares?
A. Use multiple antivirus softwares
B. Keep some generation of off-line backup
C. Analyze the ransomware to get decryption key of encrypted data
D. Pay a ransom
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Which of the following can the administrator do to verify that a tape backup can be recovered in its entirety?
A. Read the last 512 bytes of the tape
B. Read the first 512 bytes of the tape
C. Restore a random file
D. Perform a full restore
عرض الإجابة
اجابة صحيحة: D
السؤال #23
If a tester is attempting to ping a target that exists but receives no response or a response that states the destination is unreachable, ICMP may be disabled and the network may be using TCP. Which other option could the tester use to get a response from a host using TCP?
A. Traceroute
B. Hping
C. TCP ping
D. Broadcast ping
عرض الإجابة
اجابة صحيحة: B
السؤال #24
If an attacker uses the command SELECT*FROM user WHERE name = "?x' AND userid IS NULL; --"?; which type of SQL injection attack is the attacker performing?
A. End of Line Comment
B. UNION SQL Injection
C. Illegal/Logically Incorrect Query
D. Tautology
عرض الإجابة
اجابة صحيحة: A
السؤال #25
Which of the following tools performs comprehensive tests against web servers, including dangerous files and CGI's?
A. Snort
B. Dsniff
C. Nikto
D. John the Ripper
عرض الإجابة
اجابة صحيحة: C
السؤال #26
This asymmetry cipther is based on factoring the product of two large prime numbers. What cipher is described above?
A. RSA
B. MD5
C. SHA
D. RC5
عرض الإجابة
اجابة صحيحة: A
السؤال #27
This wireless security protocol allows 192-bit minimum-strength security protocols and cryptographic tools to protect sensitive data, such as GCMP-256, HMAC-SHA384, and ECDSA using a 384-bit elliptic curve. Which is this wireless security protocol?
A. WPA3-Personal
B. WPA3-Enterprise
C. WPA2-Enterprise
D. WPA2-Personal
عرض الإجابة
اجابة صحيحة: B
السؤال #28
Gerard, a disgruntled ex-employee of Sunglass IT Solutions, targets this organization to perform sophisticated attacks and bring down its reputation in the market. To launch the attacks process, he performed DNS footprinting to gather information about DNS servers and to identify the hosts connected in the target network. He used an automated tool that can retrieve information about DNS zone data including DNS domain names, computer names, IP addresses, DNS records, and network Whois records. He further exp
A. Towelroot
B. Knative
C. zANTI
D. Bluto
عرض الإجابة
اجابة صحيحة: D
السؤال #29
Which of the following is an application that requires a host application for replication?
A. Micro
B. Worm
C. Trojan
D. Virus
عرض الإجابة
اجابة صحيحة: D
السؤال #30
Why do you need to capture five to ten million packets in order to crack WEP with AirSnort?
A. All IVs are vulnerable to attack
B. Air Snort uses a cache of packets
C. Air Snort implements the FMS attack and only encrypted packets are counted
D. A majority of weak IVs transmitted by access points and wireless cards are not filtered by contemporary wireless manufacturers
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: