لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which type of cloud computing deployment is available to any person or organization who can pay the usage fees?
A. public
B. hybrid
C. private
D. local
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which option describes a characteristic of a distributed denial-of-service attack?
A. ses multiple types of malware to corrupt system services
B. ses a single remote host to delete data from multiple target servers
C. ses a single remote host to flood a target network with traffic
D. ses a botnet to flood traffic to a target network
عرض الإجابة
اجابة صحيحة: D
السؤال #3
What does Palo Alto Networks Traps do first when an endpoint is asked to run an executable?
A. end the executable to WildFire
B. un a static analysis
C. un a dynamic analysis
D. heck its execution policy
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Which type of malware is self-replicating but must first infect a host program and be executed by a user or process?
A. ootkit
B. xploit
C. ootkit
D. ulnerability
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which type of firewall monitors traffic streams from beginning to end?
A. ircuit-level gateway
B. tateless
C. tateful
D. acket filter
عرض الإجابة
اجابة صحيحة: C
السؤال #6
On an endpoint, which method should you use to secure applications against exploits?
A. full-disk encryption
B. strong user passwords
C. software patches
D. endpoint-based firewall
عرض الإجابة
اجابة صحيحة: D
السؤال #7
Which component of a digital certificate provides authentication of the certificate"?s issuer?
A. digital signature
B. certificate revocation list
C. issuer"?s private key
D. certificate"?s expiration date
عرض الإجابة
اجابة صحيحة: A
السؤال #8
What is the function of a hashing protocol?
A. ncrypts data with encapsulation
B. stablishes an unencrypted tunnel
C. stablishes a secure tunnel
D. rovides data integrity
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans and rootkits?
A. utoFocus
B. raps
C. xpedition
D. pp-ID
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Match the task for server settings in group mapping with its order in the process.Select and Place:Exhibit A:Exhibit B:
A. he answer is Exhibit B
عرض الإجابة
اجابة صحيحة: A
السؤال #11
You discover malware has corrupted the BIOS on your laptop. Which type of malware is this?
A. roperty Card Industry
B. ayment Card Industry
C. ersonal Card Industry
D. ayment Club Industry
عرض الإجابة
اجابة صحيحة: A
السؤال #12
When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk?
A. imiting
B. ssuming
C. ransferring
D. voiding
عرض الإجابة
اجابة صحيحة: A
السؤال #13
What is the primary purpose of using encryption as part of your network data security architecture?
A. ndpoint security
B. assword security
C. hysical security
D. irewall security
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which two items operate at the network layer in the OSI network model? (Choose two.)
A. latform as a service
B. omputing as a service
C. nfrastructure as a service
D. oftware as a service
عرض الإجابة
اجابة صحيحة: AB
السؤال #15
In PKI, which item is issued by a CA?
A. digital certificate
B. SSH key
C. KDC ticket
D. shared key
عرض الإجابة
اجابة صحيحة: A
السؤال #16
What is the result of deploying virtualization in your data center?
A. reduced security threat
B. reduced operational costs
C. increased hardware capital costs
D. increased host provisioning
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Which well-known port is associated with the Simple Mail Transfer Protocol?
A. 43
B. 5
C. 97
D. 0
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Which type of attack floods a target with TCP SYN requests?
A. oute table poisoning
B. econaissance
C. enial-of-service
D. P spoofing
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Match the common TCP/IP protocol with its corresponding port(s).Select and Place: Exhibit A:Exhibit B:
A. he answer is Exhibit B
عرض الإجابة
اجابة صحيحة: A
السؤال #20
What is a component of a public key infrastructure?
A. ey Distribution Center
B. DC ticket
C. SH key
D. ertificate authority
عرض الإجابة
اجابة صحيحة: D
السؤال #21
Which option lists the correct sequence of a TCP three- way handshake?
A. YN, ACK, SYN
B. YN, SYN+ACK, ACK
C. YN, ACK, FIN
D. YN, SYN+ACK, FIN
عرض الإجابة
اجابة صحيحة: B
السؤال #22
Which two components are part of a next-generation firewall security policy? (Choose two.)
A. ulnerability
B. orm
C. xploit
D. irus
عرض الإجابة
اجابة صحيحة: BC
السؤال #23
Which action must be taken prior to a successful ransomware attack to enable recovery from the attack?
A. create a data snapshot on your IDS device
B. back up all hosts that contain critical data
C. update all firewall malware signatures
D. limit external exposure of internal DNS resource records
عرض الإجابة
اجابة صحيحة: B
السؤال #24
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
A. trong endpoint passwords
B. ndpoint disk encryption
C. ndpoint antivirus software
D. ndpoint NIC ACLs
عرض الإجابة
اجابة صحيحة: C
السؤال #25
Which device would an Evil Twin attack use to lure the victim to connect to the attack surface network?
A. witch
B. irewall
C. outer
D. ccess point
عرض الإجابة
اجابة صحيحة: D
السؤال #26
Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.
A. t cannot identify command-and-control traffic
B. t cannot monitor all potential network ports
C. t assumes that all internal devices are untrusted
D. t assumes that every internal endpoint can be trusted
عرض الإجابة
اجابة صحيحة: D
السؤال #27
Which type of adversary would commit cybercrimes with the authorization of their country's government?
A. tate-sponsored
B. acktivist
C. ray hat
D. hite hat
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: