لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Two employees in the finance department installed a freeware application that contained embedded malware. The network is robustly segmented based on areas of responsibility. These computers had critical sensitive information stored locally that needs to be recovered. The department manager advised all department employees to turn off their computers until the security team could be contacted about the issue. Which of the following is the first step the incident response staff members should take when they a
A. Turn on all systems, scan for infection, and back up data to a USB storage device
B. Identify and remove the software installed on the impacted systems in the department
C. Explain that malware cannot truly be removed and then reimage the devices
D. Log on to the impacted systems with an administrator account that has privileges to perform backups
E. Segment the entire department from the network and review each computer offline
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which of the following describes how a CSIRT lead determines who should be communicated with and when during a security incident?
A. The lead should review what is documented in the incident response policy or plan
B. Management level members of the CSIRT should make that decision
C. The lead has the authority to decide who to communicate with at any time
D. Subject matter experts on the team should communicate with others within the specified area of expertise
عرض الإجابة
اجابة صحيحة: A
السؤال #3
A security analyst reviews the latest vulnerability scans and observes there are vulnerabilities with similar CVSSv3 scores but different base score metrics. Which of the following attack vectors should the analyst remediate first?
A. CVSS 3
B. CVSS 3
C. CVSS 3
D. CVSS:3
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A security team identified several rogue Wi-Fi access points during the most recent network scan. The network scans occur once per quarter. Which of the following controls would best all ow the organization to identity rogue devices more quickly?
A. Implement a continuous monitoring policy
B. Implement a BYOD policy
C. Implement a portable wireless scanning policy
D. Change the frequency of network scans to once per month
عرض الإجابة
اجابة صحيحة: C
السؤال #5
After identifying a threat, a company has decided to implement a patch management program to remediate vulnerabilities. Which of the following risk management principles is the company exercising?
A. Transfer
B. Accept
C. Mitigate
D. Avoid
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A vulnerability management team found four major vulnerabilities during an assessment and needs to provide a report for the proper prioritization for further mitigation. Which of the following vulnerabilities should have the highest priority for the mitigation process?
A. A vulnerability that has related threats and loCs, targeting a different industry
B. A vulnerability that is related to a specific adversary campaign, with loCs found in the SIEM
C. A vulnerability that has no adversaries using it or associated loCs
D. A vulnerability that is related to an isolated system, with no loCs
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A company has the following security requirements: . No public IPs · All data secured at rest . No insecure ports/protocols After a cloud scan is completed, a security analyst receives reports that several misconfigurations are putting the company at risk. Given the following cloud scanner output: Which of the following should the analyst recommend be updated first to meet the security requirements and reduce risks?
A. VM_PRD_DB
B. VM_DEV_DB
C. VM_DEV_Web02
D. VM_PRD_Web01
عرض الإجابة
اجابة صحيحة: D
السؤال #8
An analyst is evaluating the following vulnerability report: Which of the following vulnerability report sections provides information about the level of impact on data confidentiality if a successful exploitation occurs?
A. Payloads
B. Metrics
C. Vulnerability
D. Profile
عرض الإجابة
اجابة صحيحة: D
السؤال #9
An organization was compromised, and the usernames and passwords of all em-ployees were leaked online. Which of the following best describes the remedia- tion that could reduce the impact of this situation?
A. Multifactor authentication
B. Password changes
C. System hardening
D. Password encryption
عرض الإجابة
اجابة صحيحة: A
السؤال #10
During an extended holiday break, a company suffered a security incident. This information was properly relayed to appropriate personnel in a timely manner and the server was up to date and configured with appropriate auditing and logging. The Chief Information Security Officer wants to find out precisely what happened. Which of the following actions should the analyst take first?
A. Clone the virtual server for forensic analysis
B. Log in to the affected server and begin analysis of the logs
C. Restore from the last known-good backup to confirm there was no loss of connectivity
D. Shut down the affected server immediately
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A security analyst is performing an investigation involving multiple targeted Windows malware binaries. The analyst wants to gather intelligence without disclosing information to the attackers. Which of the following actions would allow the analyst to achieve the objective?
A. Upload the binary to an air gapped sandbox for analysis
B. Send the binaries to the antivirus vendor
C. Execute the binaries on an environment with internet connectivity
D. Query the file hashes using VirusTotal
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which of the following is the most important factor to ensure accurate incident response reporting?
A. A well-defined timeline of the events
B. A guideline for regulatory reporting
C. Logs from the impacted system
D. A well-developed executive summary
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which of the following is the best action to take after the conclusion of a security incident to improve incident response in the future?
A. Develop a call tree to inform impacted users
B. Schedule a review with all teams to discuss what occurred
C. Create an executive summary to update company leadership
D. Review regulatory compliance with public relations for official notification
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A company is concerned with finding sensitive file storage locations that are open to the public. The current internal cloud network is flat. Which of the following is the best solution to secure the network?
A. Implement segmentation with ACLs
B. Configure logging and monitoring to the SIEM
C. Deploy MFA to cloud storage locations
D. Roll out an IDS
عرض الإجابة
اجابة صحيحة: B
السؤال #15
A SOC manager is establishing a reporting process to manage vulnerabilities. Which of the following would be the best solution to identify potential loss incurred by an issue?
A. Trends
B. Risk score
C. Mitigation
D. Prioritization
عرض الإجابة
اجابة صحيحة: A
السؤال #16
An attacker recently gained unauthorized access to a financial institution's database, which contains confidential information. The attacker exfiltrated a large amount of data before being detected and blocked. A security analyst needs to complete a root cause analysis to determine how the attacker was able to gain access. Which of the following should the analyst perform first?
A. Document the incident and any findings related to the attack for future reference
B. Interview employees responsible for managing the affected systems
C. Review the log files that record all events related to client applications and user access
D. Identify the immediate actions that need to be taken to contain the incident and minimize damage
عرض الإجابة
اجابة صحيحة: B
السؤال #17
During an incident, a security analyst discovers a large amount of Pll has been emailed externally from an employee to a public email address. The analyst finds that the external email is the employee's personal email. Which of the following should the analyst recommend be done first?
A. Place a legal hold on the employee's mailbox
B. Enable filtering on the web proxy
C. Disable the public email access with CASB
D. Configure a deny rule on the firewall
عرض الإجابة
اجابة صحيحة: C
السؤال #18
A vulnerability management team is unable to patch all vulnerabilities found during their weekly scans. Using the third-party scoring system described below, the team patches the most urgent vulnerabilities: Additionally, the vulnerability management team feels that the metrics Smear and Channing are less important than the others, so these will be lower in priority. Which of the following vulnerabilities should be patched first, given the above third-party scoring system?
A. InLoud: Cobain: Yes Grohl: No Novo: Yes Smear: Yes Channing: No B
عرض الإجابة
اجابة صحيحة: C
السؤال #19
A security analyst reviews the following Arachni scan results for a web application that stores PII data: Which of the following should be remediated first?
A. SQL injection
B. RFI
C. XSS
D. Code injection
عرض الإجابة
اجابة صحيحة: C
السؤال #20
A team of analysts is developing a new internal system that correlates information from a variety of sources analyzes that information, and then triggers notifications according to company policy Which of the following technologies was deployed?
A. SIEM
B. SOAR
C. IPS
D. CERT
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: