لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Appending string values onto another string is called:
A. compilation
B. connection
C. concatenation
D. conjunction
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A company becomes concerned when the security alarms are triggered during a penetration test. Which of the following should the company do NEXT?
A. Halt the penetration test
B. Contact law enforcement
C. Deconflict with the penetration tester
D. Assume the alert is from the penetration test
عرض الإجابة
اجابة صحيحة: C
السؤال #3
A penetration tester has been hired to configure and conduct authenticated scans of all the servers on a software company’s network. Which of the following accounts should the tester use to return the MOST results?
A. Root user
B. Local administrator
C. Service
D. Network administrator
عرض الإجابة
اجابة صحيحة: A
السؤال #4
Given the following output: User-agent:* Disallow: /author/ Disallow: /xmlrpc.php Disallow: /wp-admin Disallow: /page/ During which of the following activities was this output MOST likely obtained?
A. Website scraping
B. Website cloning
C. Domain enumeration
D. URL enumeration
عرض الإجابة
اجابة صحيحة: C
السؤال #5
A penetration tester has obtained a low-privilege shell on a Windows server with a default configuration and now wants to explore the ability to exploit misconfigured service permissions. Which of the following commands would help the tester START this process?
A. certutil–urlcache –split –f http://192
B. powershell(New-Object System
C. schtasks /query /fo LIST /v | find /I “Next Run Time:”
D. wgethttp://192
عرض الإجابة
اجابة صحيحة: B
السؤال #6
A penetration tester is exploring a client’s website. The tester performs a curl command and obtains the following: * Connected to 10.2.11.144 (::1) port 80 (#0) > GET /readmine.html HTTP/1.1 > Host: 10.2.11.144 > User-Agent: curl/7.67.0 > Accept: */* > * Mark bundle as not supporting multiuse < HTTP/1.1 200 < Date: Tue, 02 Feb 2021 21:46:47 GMT < Server: Apache/2.4.41 (Debian) < Content-Length: 317 < Content-Type: text/html; charset=iso-8859-1 <
A. Burp Suite
B. DirBuster
C. WPScan
D. OWASP ZAP
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A penetration tester wants to identify CVEs that can be leveraged to gain execution on a Linux server that has an SSHD running. Which of the following would BEST support this task?
A. Run nmap with the –o, -p22, and –sC options set against the target
B. Run nmap with the –sV and –p22 options set against the target
C. Run nmap with the --script vulners option set against the target
D. Run nmap with the –sA option set against the target
عرض الإجابة
اجابة صحيحة: B
السؤال #8
A large client wants a penetration tester to scan for devices within its network that are Internet facing. The client is specifically looking for Cisco devices with no authentication requirements. Which of the following settings in Shodan would meet the client’s requirements?
A. “cisco-ios” “admin+1234”
B. “cisco-ios” “no-password”
C. “cisco-ios” “default-passwords”
D. “cisco-ios” “last-modified”
عرض الإجابة
اجابة صحيحة: C
السؤال #9
A new security firm is onboarding its first client. The client only allowed testing over the weekend and needed the results Monday morning. However, the assessment team was not able to access the environment as expected until Monday. Which of the following should the security company have acquired BEFORE the start of the assessment?
A. A signed statement of work
B. The correct user accounts and associated passwords
C. The expected time frame of the assessment
D. The proper emergency contacts for the client
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: