لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following roles would MOST likely have direct access to the senior management team?
A. Data custodian
B. Data owner
C. Data protection officer
D. Data controller
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A security administrator is setting up a SIEM to help monitor for notable events across the enterprise. Which of the following control types does this BEST represent?
A. Preventive
B. Compensating
C. Corrective
D. Detective
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Stakeholders at an organisation must be kept aware of any incidents and receive updates on status changes as they occur Which of the following Plans would fulfill this requirement?
A. Communication plan
B. Disaster recovery plan
C. Business continuity plan
D. Risk plan
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A company completed a vulnerability scan. The scan found malware on several systems that were running older versions of Windows. Which of the following is MOST likely the cause of the malware infection?
A. Open permissions
B. Improper or weak patch management
C. Unsecure root accounts
D. Default settings
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which of the following BEST describes a social-engineering attack that relies on an executive at a small business visiting a fake banking website where credit card and account details are harvested?
A. Whaling
B. Spam
C. Invoice scam
D. Pharming
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A local server recently crashed, and the team is attempting to restore the server from a backup. During the restore process, the team notices the file size of each daily backup is large and will run out of space at the current rate. The current solution appears to do a full backup every night. Which of the following would use the least amount of storage space for backups?
A. A weekly, incremental backup with daily differential backups
B. A weekly, full backup with daily snapshot backups
C. A weekly, full backup with daily differential backups
D. A weekly, full backup with daily incremental backups
عرض الإجابة
اجابة صحيحة: A
السؤال #7
A company wants to enable BYOD for checking email and reviewing documents. Many of the documents contain sensitive organizational information. Which of the following should be deployed first before allowing the use of personal devices to access company data?
A. MDM
B. RFID
C. DLR
D. SIEM
عرض الإجابة
اجابة صحيحة: B
السؤال #8
A user attempts to load a web-based application, but the expected login screen does not appear A help desk analyst troubleshoots the issue by running the following command and reviewing the output on the user's PC The help desk analyst then runs the same command on the local PC Which of the following BEST describes the attack that is being detected?
A. Domain hijacking
B. DNS poisoning
C. MAC flooding
D. Evil twin
عرض الإجابة
اجابة صحيحة: C
السؤال #9
Which of the following authentication methods is considered to be the LEAST secure?
A. TOTP
B. SMS
C. HOTP
D. Token key
عرض الإجابة
اجابة صحيحة: B
السؤال #10
A company is developing a new initiative to reduce insider threats. Which of the following should the company focus on to make the greatest impact?
A. Social media analysis
B. Least privilege
C. Nondisclosure agreements
D. Mandatory vacation
عرض الإجابة
اجابة صحيحة: C
السؤال #11
A Chief Information Security Officer (CISO) is evaluating the dangers involved in deploying a new ERP system for the company. The CISO categorizes the system, selects the controls that apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system. Which of the following is the CISO using to evaluate the environment for this new ERP system?
A. The Diamond Model of Intrusion Analysis
B. CIS Critical Security Controls
C. NIST Risk Management Framework
D. ISO 27002
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A security team is engaging a third-party vendor to do a penetration test of a new proprietary application prior to its release. Which of the following documents would the third-party vendor most likely be required to review and sign?
A. SLA
B. NDA
C. MOU
D. AUP
عرض الإجابة
اجابة صحيحة: D
السؤال #13
A company recently experienced an attack during which its main website was Directed to the attacker's web server, allowing the attacker to harvest credentials from unsuspecting customers, Which of the following should the company implement to prevent this type of attack from occurring In the future?
A. IPsec
B. SSL/TLS
C. ONSSEC
D. SMIME
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Employees at a company are receiving unsolicited text messages on their corporate cell phones. The unsolicited text messages contain a password reset Link. Which of the attacks is being used to target the company?
A. Phishing
B. Vishing
C. Smishing
D. Spam
عرض الإجابة
اجابة صحيحة: D
السؤال #15
A new vulnerability in the SMB protocol on the Windows systems was recently discovered, but no patches are currently available to resolve the issue. The security administrator is concerned tf servers in the company's DMZ will be vulnerable to external attack; however, the administrator cannot disable the service on the servers, as SMB is used by a number of internal systems and applications on the LAN. Which of the following TCP ports should be blocked for all external inbound connections to the DMZ as a wo
A. 135
B. 139
C. 143
D. 161
E. 443
F. 445
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Which of the following best describes a tool used by an organization to identi-fy, log, and track any potential risks and corresponding risk information?
A. Quantitative risk assessment
B. Risk register
C. Risk control assessment
D. Risk matrix
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: