لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
According to the September 2020 threat intelligence feeds a new malware called Egregor was introduced and used in many attacks. Distnbution of Egregor is pnmanly through a Cobalt Strike that has been installed on victim's workstations using RDP exploits Malware exfiltrates the victim's data to a command and control server. The data is used to force victims pay or lose it by publicly releasing it. Which type of attack is described?
A. malware attack
B. ransomware attack
C. whale-phishing
D. insider threat
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which access control model does SELinux use?
A. RBAC
B. DAC
C. MAC
D. ABAC
عرض الإجابة
اجابة صحيحة: DE
السؤال #3
One of the objectives of information security is to protect the CIA of information and systems. What does CIA mean in this context?
A. confidentiality, identity, and authorization
B. confidentiality, integrity, and authorization
C. confidentiality, identity, and availability
D. confidentiality, integrity, and availability
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Which field contains DNS header information if the payload is a query or a response?
A. Z
B. ID
C. TC
D. QR
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which information must an organization use to understand the threats currently targeting the organization?
A. threat intelligence
B. risk scores
C. vendor suggestions
D. vulnerability exposure
عرض الإجابة
اجابة صحيحة: AD
السؤال #6
Which of these describes SOC metrics in relation to security incidents?
A. time it takes to detect the incident
B. time it takes to assess the risks of the incident
C. probability of outage caused by the incident
D. probability of compromise and impact caused by the incident
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which signature impacts network traffic by causing legitimate traffic to be blocked?
A. false negative
B. true positive
C. true negative
D. false positive
عرض الإجابة
اجابة صحيحة: D
السؤال #8
When trying to evade IDS/IPS devices, which mechanism allows the user to make the data incomprehensible without a specific key, certificate, or password?
A. fragmentation
B. pivoting
C. encryption
D. stenography
عرض الإجابة
اجابة صحيحة: C
السؤال #9
An engineer must compare NIST vs ISO frameworks The engineer deeded to compare as readable documentation and also to watch a comparison video review. Using Windows 10 OS. the engineer started a browser and searched for a NIST document and then opened a new tab in the same browser and searched for an ISO document for comparison The engineer tried to watch the video, but there 'was an audio problem with OS so the engineer had to troubleshoot it At first the engineer started CMD and looked fee a driver path th
A. permissions
B. PowerShell logs
C. service
D. MBR
E. process and thread
عرض الإجابة
اجابة صحيحة: AC
السؤال #10
Which data type is necessary to get information about source/destination ports?
A. statistical data
B. session data
C. connectivity data
D. alert data
عرض الإجابة
اجابة صحيحة: C
السؤال #11
What is the difference between the ACK flag and the RST flag in the NetFlow log session?
A. The RST flag confirms the beginning of the TCP connection, and the ACK flag responds when the datafor the payload is complete
B. The ACK flag confirms the beginning of the TCP connection, and the RST flag responds when the data for the payload is complete
C. The RST flag confirms the receipt of the prior segment, and the ACK flag allows for the spontaneous termination of a connection
D. The ACK flag confirms the receipt of the prior segment, and the RST flag allows for the spontaneous termination of a connection
عرض الإجابة
اجابة صحيحة: D
السؤال #12
An analyst is investigating an incident in a SOC environment. Which method is used to identify a session from a group of logs?
A. sequence numbers
B. IP identifier
C. 5-tuple
D. timestamps
عرض الإجابة
اجابة صحيحة: C
السؤال #13
What are the two characteristics of the full packet captures? (Choose two.)
A. Identifying network loops and collision domains
B. Troubleshooting the cause of security and performance issues
C. Reassembling fragmented traffic from raw data
D. Detecting common hardware faults and identify faulty assets
E. Providing a historical record of a network transaction
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which two elements are used for profiling a network? (Choose two.)
A. total throughout
B. session duration
C. running processes
D. OS fingerprint
E. listening ports
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: