لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
According to the SNORT alert, what is the attacker performing?
A. brute-force attack against the web application user accounts
B. XSS attack against the target webserver
C. brute-force attack against directories and files on the target webserver
D. SQL injection attack against the target webserver
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A company that uses only the Unix platform implemented an intrusion detection system. After the initial configuration, the number of alerts is overwhelming, and an engineer needs to analyze and classify the alerts. The highest number of alerts were generated from the signature shown in the exhibit. Which classification should the engineer assign to this event?
A. True Negative alert
B. False Negative alert
C. False Positive alert
D. True Positive alert
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which determination should be made by a security analyst?
A. An email was sent with an attachment named “Grades
B. An email was sent with an attachment named “Grades
C. An email was sent with an attachment named “Final Report
D. An email was sent with an attachment named “Final Report
عرض الإجابة
اجابة صحيحة: S
السؤال #4
An engineer received a call to assist with an ongoing DDoS attack. The Apache server is being targeted, and availability is compromised. Which step should be taken to identify the origin of the threat?
A. An engineer should check the list of usernames currently logged in by running the command $ who | cut –d’ ‘ -f1| sort | uniq
B. An engineer should check the server’s processes by running commands ps -aux and sudo ps -a
C. An engineer should check the services on the machine by running the command service -status-all
D. An engineer should check the last hundred entries of a web server with the command sudo tail -100 /var/log/apache2/access
عرض الإجابة
اجابة صحيحة: B
السؤال #5
An organization uses a Windows 7 workstation for access tracking in one of their physical data centers on which a guard documents entrance/exit activities of all personnel. A server shut down unexpectedly in this data center, and a security specialist is analyzing the case. Initial checks show that the previous two days of entrance/exit logs are missing, and the guard is confident that the logs were entered on the workstation. Where should the security specialist look next to continue investigating this cas
A. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon
B. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\ProfileList
C. HKEY_CURRENT_USER\Software\Classes\Winlog
D. HKEY_LOCAL_MACHINES\SOFTWARE\Microsoft\WindowsNT\CurrentUser
عرض الإجابة
اجابة صحيحة: AB
السؤال #6
An engineer received a report of a suspicious email from an employee. The employee had already opened the attachment, which was an empty Word document. The engineer cannot identify any clear signs of compromise but while reviewing running processes, observes that PowerShell.exe was spawned by cmd.exe with a grandparent winword.exe process. What is the recommended action the engineer should take?
A. Upload the file signature to threat intelligence tools to determine if the file is malicious
B. Monitor processes as this a standard behavior of Word macro embedded documents
C. Contain the threat for further analysis as this is an indication of suspicious activity
D. Investigate the sender of the email and communicate with the employee to determine the motives
عرض الإجابة
اجابة صحيحة: D
السؤال #7
After a cyber attack, an engineer is analyzing an alert that was missed on the intrusion detection system. The attack exploited a vulnerability in a business critical, web-based application and violated its availability. Which two migration techniques should the engineer recommend? (Choose two.)
A. encapsulation
B. NOP sled technique
C. address space randomization
D. heap-based security
E. data execution prevention
عرض الإجابة
اجابة صحيحة: S
السؤال #8
According to the Wireshark output, what are two indicators of compromise for detecting an Emotet malware download? (Choose two.)
A. Domain name:iraniansk
B. Server: nginx
C. Hash value: 5f31ab113af08=1597090577
D. filename= “Fy
E. Content-Type: application/octet-stream
عرض الإجابة
اجابة صحيحة: A
السؤال #9
What should be determined from this Apache log?
A. A module named mod_ssl is needed to make SSL connections
B. The private key does not match with the SSL certificate
C. The certificate file has been maliciously modified
D. The SSL traffic setup is improper
عرض الإجابة
اجابة صحيحة: AD
السؤال #10
An employee notices unexpected changes and setting modifications on their workstation and creates an incident ticket. A support specialist checks processes and services but does not identify anything suspicious. The ticket was escalated to an analyst who reviewed this event log and also discovered that the workstation had multiple large data dumps on network shares. What should be determined from this information?
A. data obfuscation
B. reconnaissance attack
C. brute-force attack
D. log tampering
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which technique is used to evade detection from security products by executing arbitrary code in the address space of a separate live operation?
A. process injection
B. privilege escalation
C. GPO modification
D. token manipulation
عرض الإجابة
اجابة صحيحة: AC
السؤال #12
A security team received reports of users receiving emails linked to external or unknown URLs that are non-returnable and non-deliverable. The ISP also reported a 500% increase in the amount of ingress and egress email traffic received. After detecting the problem, the security team moves to the recovery phase in their incident response plan. Which two actions should be taken in the recovery phase of this incident? (Choose two.)
A. verify the breadth of the attack
B. collect logs
C. request packet capture
D. remove vulnerabilities
E. scan hosts with updated signatures
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Which type of code created the snippet?
A. VB Script
B. Python
C. PowerShell
D. Bash Script
عرض الإجابة
اجابة صحيحة: CE
السؤال #14
A security analyst notices unusual connections while monitoring traffic. What is the attack vector, and which action should be taken to prevent this type of event?
A. DNS spoofing; encrypt communication protocols
B. SYN flooding, block malicious packets
C. ARP spoofing; configure port security
D. MAC flooding; assign static entries
عرض الإجابة
اجابة صحيحة: C
السؤال #15
An organization recovered from a recent ransomware outbreak that resulted in significant business damage. Leadership requested a report that identifies the problems that triggered the incident and the security team’s approach to address these problems to prevent a reoccurrence. Which components of the incident should an engineer analyze first for this report?
A. impact and flow
B. cause and effect
C. risk and RPN
D. motive and factors
عرض الإجابة
اجابة صحيحة: A
السؤال #16
What are YARA rules based upon?
A. binary patterns
B. HTML code
C. network artifacts
D. IP addresses
عرض الإجابة
اجابة صحيحة: C
السؤال #17
An HR department submitted a ticket to the IT helpdesk indicating slow performance on an internal share server. The helpdesk engineer checked the server with a real-time monitoring tool and did not notice anything suspicious. After checking the event logs, the engineer noticed an event that occurred 48 hour prior. Which two indicators of compromise should be determined from this information? (Choose two.)
A. unauthorized system modification
B. privilege escalation
C. denial of service attack
D. compromised root access
E. malware outbreak
عرض الإجابة
اجابة صحيحة: C
السؤال #18
A scanner detected a malware-infected file on an endpoint that is attempting to beacon to an external site. An analyst has reviewed the IPS and SIEM logs but is unable to identify the file’s behavior. Which logs should be reviewed next to evaluate this file further?
A. email security appliance
B. DNS server
C. Antivirus solution
D. network device
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which two actions should be taken as a result of this information? (Choose two.)
A. Update the AV to block any file with hash “cf2b3ad32a8a4cfb05e9dfc45875bd70”
B. Block all emails sent from an @state
C. Block all emails with pdf attachments
D. Block emails sent from Admin@state
E. Block all emails with subject containing “cf2b3ad32a8a4cfb05e9dfc45875bd70”
عرض الإجابة
اجابة صحيحة: A
السؤال #20
What do these artifacts indicate?
A. An executable file is requesting an application download
B. A malicious file is redirecting users to different domains
C. The MD5 of a file is identified as a virus and is being blocked
D. A forged DNS request is forwarding users to malicious websites
عرض الإجابة
اجابة صحيحة: B
السؤال #21
An engineer is analyzing a ticket for an unexpected server shutdown and discovers that the web-server ran out of useable memory and crashed. Which data is needed for further investigation?
A. /var/log/access
B. /var/log/messages
C. /var/log/httpd/messages
D. /var/log/httpd/access
عرض الإجابة
اجابة صحيحة: S

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: