لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A penetration tester notices that the X-Frame-Optjons header on a web application is not set. Which of the following would a malicious actor do to explogt this configuration setting?
A. Use path modification to escape the application's framework
B. Create a frame that overlays the application
C. Inject a malicious iframe containing JavaScript
D. Pass an iframe attribute that is maliciou
عرض الإجابة
اجابة صحيحة: D
السؤال #2
The following command is run on a Linux file system: Chmod 4111 /usr/bin/sudo Which of the following issues may be explogted now?
A. Kernel vulnerabilities
B. Sticky bits
C. Unquoted service path
D. Misconfigured sudo
عرض الإجابة
اجابة صحيحة: B
السؤال #3
A client is asking a penetration tester to evaluate a new web application for availability. Which of the following types of attacks should the tester use?
A. TCP SYN flood
B. SQL injection
C. xss
D. XMAS scan
عرض الإجابة
اجابة صحيحة: A
السؤال #4
After performing a security assessment for a firm, the client was found to have been billed for the time the client's test environment was unavailable The Client claims to have been billed unfairly. Which of the following documents would MOST likely be able to provide guidance in such a situation?
A. SOW
B. NDA
C. EULA
D. BRA
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A penetration tester successfully explogts a Windows host and dumps the hashes Which of the following hashes can the penetration tester use to perform a pass- the-hash attack?
A. Option A
B. Option B
C. Option C
D. Option D
عرض الإجابة
اجابة صحيحة: A
السؤال #6
While prioritizing findings and recommendations for an executive summary, which of the following considerations would De MOST valuable to the client?
A. Levels of difficulty to explogt identified vulnerabilities
B. Time taken to accomplish each step
C. Risk tolerance of the organization
D. Availability of patches and remediations
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A security consultant is trying to attack a device with a previous identified user account. Which of the following types of attacks is being executed?
A. Credential dump attack
B. DLL injection attack
C. Reverse shell attack
D. Pass the hash attack
عرض الإجابة
اجابة صحيحة: D
السؤال #8
A constant wants to scan all the TCP Pots on an identified device. Which of the following Nmap switches will complete this task?
A. -p-
B. -p ALX,
C. -p 1-65534
D. -port 1-65534
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: