لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Given the following script: Which of the following BEST describes the purpose of this script?
A. Log collection
B. Event logging
C. Keystroke monitoring
D. Debug message collection
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A security consultant found a SCADA device in one of the VLANs in scope. Which of the following actions would BEST create a potentially destructive outcome against device?
A. Launch an SNMP password brute force attack against the device
B. Lunch a Nessus vulnerability scan against the device
C. Launch a DNS cache poisoning attack against the device
D. Launch an SMB explogt against the devic
عرض الإجابة
اجابة صحيحة: D
السؤال #3
While engaging clients for a penetration test from highly regulated industries, which of the following is usually the MOST important to the clients from a business perspective?
A. Letter of engagement and attestation of findings
B. NDA and MSA
C. SOW and final report
D. Risk summary and executive summary
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A penetration test was performed by an on-staff technicians junior technician. During the test, the technician discovered the application could disclose an SQL table with user account and password information. Which of the following is the MOST effective way to notify management of this finding and its importance?
A. Document Ihe findtngs with an executive summary, recommendations, and screenshots of the web apphcation disclosure
B. Connect to the SQL server using this information and change the password to one or two noncritical accounts to demonstrate a proof-of-concept to management
C. Notify the development team of the discovery and suggest that input validation be implementedon the web application's SQL query strings
D. Request that management create an RFP to begin a formal engagement with a professional penetration testing company
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A penetration tester was able to retrieve the initial VPN user domain credentials by phishing a member of the IT department. Afterward, the penetration tester obtained hashes over the VPN and easily cracked them using a dictionary attack Which of the following remediation steps should be recommended? (Select THREE)
A. Mandate all employees take security awareness training
B. Implement two-factor authentication for remote access
C. Install an intrusion prevention system
D. Increase password complexity requirements
E. Install a security information event monitoring solution
F. Prevent members of the IT department from interactively logging in as administrators G
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A penetration tester is designing a phishing campaign and wants to build list of users (or the target organization. Which of the following techniques would be the MOST appropriate? (Select TWO)
A. Query an Internet WHOIS database
B. Search posted job listings
C. Scrape the company website
D. Harvest users from social networking sites
E. Socially engineer the corporate call cente
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which of the following CPU register does the penetration tester need to overwrite in order to explogt a simple butter overflow?
A. Stack pointer register
B. Index pointer register
C. Stack base pointer
D. Destination index register
عرض الإجابة
اجابة صحيحة: C
السؤال #8
In which of the following components is an explogted vulnerability MOST likely to affect multiple running application containers at once?
A. Common libraries
B. Configuration files
C. Sandbox escape
D. ASLR bypass
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which of the following BEST explains why it is important to maintain confidentiality of any identified findings when performing a penetration test?
A. Penetration test findings often contain company intellectual property
B. Penetration test findings could lead to consumer dissatisfaction if made pubic
C. Penetration test findings are legal documents containing privileged information
D. Penetration test findings can assist an attacker in compromising a system
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A penetration tester ran the following Nmap scan on a computer nmap -sV 192.168.1.5 The organization said it had disabled Telnet from its environment However, the results of the Nmap scan show port 22 as closed and port 23 as open to SSH Which of the following is the BEST explanation for what happened?
A. The organization failed to disable Telnet
B. Nmap results contain a false positive for port 23
C. Port 22 was filtered
D. The service is running on a non-standard por
عرض الإجابة
اجابة صحيحة: D
السؤال #11
A penetration tester has been asked to conduct OS fingerprinting with Nmap using a companyprovide text file that contain a list of IP addresses. Which of the following are needed to conduct this scan? (Select TWO).
A. -O
B. _iL
C. _sV
D. -sS
E. -oN
F. -oX
عرض الإجابة
اجابة صحيحة: A
السؤال #12
The results of a basic compliance scan show a subset of assets on a network. This data differs from what is shown on the network architecture diagram, which was supplied at the beginning of the test. Which of the following are the MOST likely causes for this difference? (Select TWO)
A. Storage access
B. Limited network access
C. Misconfigured DHCP server
D. Incorrect credentials
E. Network access controls
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Joe, a penetration tester, is asked to assess a company's physical security by gaining access to its corporate office. Joe ism looking for a method that will enable him to enter the building during business hours or when there are no employee on-site. Which of the following would be MOST effective in accomplishing this?
A. Badge cloning
B. Lock picking
C. Tailgating
D. Piggybacking
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A tester has captured a NetNTLMv2 hash using Responder Which of the following commands will allow the tester to crack the hash using a mask attack?
A. hashcat -m 5600 -r rulea/beat64
B. hashcax -m 5€00 hash
C. hashc&t -m 5600 -a 3 haah
D. hashcat -m 5600 -o reaulta
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which of the following has a direct and significant impact on the budget of the security assessment?
A. Scoping
B. Scheduling
C. Compliance requirement
D. Target risk
عرض الإجابة
اجابة صحيحة: A
السؤال #16
An assessor begins an internal security test of the Windows domain internal. comptia. net. The assessor is given network access via DHCP, but is not given any network maps or target IP addresses. Which of the following commands can the assessor use to find any likely Windows domain controllers?
A. Option A
B. Option B
C. Option C
D. Option D
عرض الإجابة
اجابة صحيحة: BDG
السؤال #17
An email sent from the Chief Executive Officer (CEO) to the Chief Financial Officer (CFO) states a wire transfer is needed to pay a new vendor. Neither is aware of the vendor, and the CEO denies ever sending the email. Which of the following types of motivation was used m this attack?
A. Principle of fear
B. Principle of authority
C. Principle of scarcity
D. Principle of likeness
E. Principle of social proof
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: