لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
An organization supports a large number of remote users. Which of the following is the best option to protect the data on the remote users' laptops?
A. Require the use of VPNs
B. Require employees to sign an NDA
C. Implement a DLP solution
D. Use whole disk encryption
عرض الإجابة
اجابة صحيحة: D
السؤال #2
A security analyst is monitoring a company's network traffic and finds ping requests going to accounting and human resources servers from a SQL server. Upon investigation, the analyst discovers a technician responded to potential network connectivity issues. Which of the following is the best way for the security analyst to respond?
A. Report this activity as a false positive, as the activity is legitimate
B. Isolate the system and begin a forensic investigation to determine what was compromised
C. Recommend network segmentation to the management team as a way to secure the various environments
D. Implement host-based firewalls on all systems to prevent ping sweeps in the future
عرض الإجابة
اجابة صحيحة: A
السؤال #3
Which of the following software assessment methods world peak times?
A. Security regression testing
B. Stress testing
C. Static analysis testing
D. Dynamic analysis testing
E. User acceptance testing
عرض الإجابة
اجابة صحيحة: B
السؤال #4
An analyst has received an IPS event notification from the SIEM stating an IP address, which is known to be malicious, has attempted to exploit a zero-day vulnerability on several web servers. The exploit contained the following snippet:/wp-json/trx_addons/V2/get/sc_layout?sc=wp_insert_user&role=administratorWhich of the following controls would work best to mitigate the attack represented by this snippet?
A. Limit user creation to administrators only
B. Limit layout creation to administrators only
C. Set the directory trx_addons to read only for all users
D. Set the directory V2 to read only for all users
عرض الإجابة
اجابة صحيحة: A
السؤال #5
During an audit, several customer order forms were found to contain inconsistencies between the actual price of an item and the amount charged to the customer. Further investigation narrowed the cause of the issue to manipulation of the public-facing web form used by customers to order products. Which of the following would be the best way to locate this issue?
A. Reduce the session timeout threshold
B. Deploy MFA for access to the web server
C. Implement input validation
D. Run a dynamic code analysis
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A security analyst is trying to validate the results of a web application scan with Burp Suite. The security analyst performs the following: Which of the following vulnerabilitles Is the securlty analyst trylng to valldate? The security analyst is validating a Local File Inclusion (LFI) vulnerability, as indicated by the ''/.../.../.../'' in the GET request which is a common indicator of directory traversal attempts associated with LFI. The other options are not relevant for this purpose: SQL injection inv
A. QL injection
B. FI
C. SS
D. SRF
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Which of the following best describes the process of requiring remediation of a known threat within a given time frame?
A. SLA
B. MOU
C. Best-effort patching
D. Organizational governance
عرض الإجابة
اجابة صحيحة: A
السؤال #8
While performing a dynamic analysis of a malicious file, a security analyst notices the memory address changes every time the process runs. Which of the following controls is most likely preventing the analyst from finding the proper memory address of the piece of malicious code?
A. Address space layout randomization
B. Data execution prevention
C. Stack canary
D. Code obfuscation
عرض الإجابة
اجابة صحيحة: A
السؤال #9
An employee is suspected of misusing a company-issued laptop. The employee has been suspended pending an investigation by human resources. Which of the following is the best step to preserve evidence?
A. Disable the user's network account and access to web resources
B. Make a copy of the files as a backup on the server
C. Place a legal hold on the device and the user's network share
D. Make a forensic image of the device and create a SRA-I hash
عرض الإجابة
اجابة صحيحة: B
السؤال #10
A security analyst is supporting an embedded software team. Which of the following is the best recommendation to ensure proper error handling at runtime?
A. Perform static code analysis
B. Require application fuzzing
C. Enforce input validation
D. Perform a code review
عرض الإجابة
اجابة صحيحة: D
السؤال #11
An organization enabled a SIEM rule to send an alert to a security analyst distribution list when ten failed logins occur within one minute. However, the control was unable to detect an attack with nine failed logins. Which of the following best represents what occurred?
A. False positive
B. True negative
C. False negative
D. True positive
عرض الإجابة
اجابة صحيحة: C
السؤال #12
The Chief Information Security Officer for an organization recently received approval to install a new EDR solution. Following the installation, the number of alerts that require remediation by an analyst has tripled. Which of the following should the organization utilize to best centralize the workload for the internal security team? (Select two). SOAR (Security Orchestration, Automation and Response) and SIEM (Security Information and Event Management) are solutions that can help centralize the workload f
A. OAR
B. IEM
C. SP
D. GFW
E. DR
F. LP
عرض الإجابة
اجابة صحيحة: AB
السؤال #13
A cybersecurity analyst is researching operational data to develop a script that will detect the presence of a threat on corporate assets. Which of the following contains the most useful information to produce this script?
A. API documentation
B. Protocol analysis captures
C. MITRE ATT&CK reports
D. OpenloC files
عرض الإجابة
اجابة صحيحة: C
السؤال #14
A forensic analyst is conducting an investigation on a compromised server Which of the following should the analyst do first to preserve evidence''
A. Restore damaged data from the backup media
B. Create a system timeline
C. Monitor user access to compromised systems
D. Back up all log files and audit trails
عرض الإجابة
اجابة صحيحة: D
السؤال #15
A security analyst is reviewing the findings of the latest vulnerability report for a company's web application. The web application accepts files for a Bash script to be processed if the files match a given hash. The analyst is able to submit files to the system due to a hash collision. Which of the following should the analyst suggest to mitigate the vulnerability with the fewest changes to the current script and infrastructure?
A. Deploy a WAF to the front of the application
B. Replace the current MD5 with SHA-256
C. Deploy an antivirus application on the hosting system
D. Replace the MD5 with digital signatures
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Security analysts review logs on multiple servers on a daily basis. Which of the following implementations will give the best central visibility into the events occurring throughout the corporate environment without logging in to the servers individually?
A. Deploy a database to aggregate the logging
B. Configure the servers to forward logs to a SIEM
C. Share the log directory on each server to allow local access
D. Automate the emailing of logs to the analysts
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Legacy medical equipment, which contains sensitive data, cannot be patched. Which of the following is the best solution to improve the equipment's security posture?
A. Move the legacy systems behind a WAR
B. Implement an air gap for the legacy systems
C. Place the legacy systems in the perimeter network
D. Implement a VPN between the legacy systems and the local network
عرض الإجابة
اجابة صحيحة: B
السؤال #18
An organization would like to ensure its cloud infrastructure has a hardened configuration. A requirement is to create a server image that can be deployed with a secure template. Which of the following is the best resource to ensure secure configuration?
A. CIS Benchmarks
B. PCI DSS
C. OWASP Top Ten
D. ISO 27001
عرض الإجابة
اجابة صحيحة: D
السؤال #19
Which of the following would help to minimize human engagement and aid in process improvement in security operations?
A. OSSTMM
B. SIEM
C. SOAR
D. OWASP
عرض الإجابة
اجابة صحيحة: C
السؤال #20
An organization wants to move non-essential services into a cloud computing environment. The management team has a cost focus and would like to achieve a recovery time objective of 12 hours. Which of the following cloud recovery strategies would work best to attain the desired outcome?
A. Duplicate all services in another instance and load balance between the instances
B. Establish a hot site with active replication to another region within the same cloud provider
C. Set up a warm disaster recovery site with the same cloud provider in a different region
D. Configure the systems with a cold site at another cloud provider that can be used for failover
عرض الإجابة
اجابة صحيحة: C
السؤال #21
A security analyst discovers the accounting department is hosting an accounts receivable form on a public document service. Anyone with the link can access it. Which of the following threats applies to this situation?
A. Potential data loss to external users
B. Loss of public/private key management
C. Cloud-based authentication attack
D. Identification and authentication failures
عرض الإجابة
اجابة صحيحة: A
السؤال #22
A cybersecurity analyst is concerned about attacks that use advanced evasion techniques. Which of the following would best mitigate such attacks?
A. Keeping IPS rules up to date
B. Installing a proxy server
C. Applying network segmentation
D. Updating the antivirus software
عرض الإجابة
اجابة صحيحة: A
السؤال #23
A security analyst discovers an LFI vulnerability that can be exploited to extract credentials from the underlying host. Which of the following patterns can the security analyst use to search the web server logs for evidence of exploitation of that particular vulnerability?
A. /etc/shadow
B. curl localhost
C. ; printenv
D. cat /proc/self/
عرض الإجابة
اجابة صحيحة: A
السؤال #24
Which of the following will most likely ensure that mission-critical services are available in the event of an incident?
A. Business continuity plan
B. Vulnerability management plan
C. Disaster recovery plan
D. Asset management plan
عرض الإجابة
اجابة صحيحة: C
السؤال #25
A security analyst is reviewing the logs of a web server and notices that an attacker has attempted to exploit a SQL injection vulnerability. Which of the following tools can the analyst use to analyze the attack and prevent future attacks? A web application firewall (WAF) is a tool that can protect web servers from attacks such as SQL injection, cross-site scripting, and other web-based threats. A WAF can filter, monitor, and block malicious HTTP traffic before it reaches the web server. A WAF can also be
A. web application firewall
B. network intrusion detection system
C. vulnerability scanner
D. web proxy
عرض الإجابة
اجابة صحيحة: A
السؤال #26
A security analyst discovers the company's website is vulnerable to cross-site scripting. Which of the following solutions will best remedy the vulnerability?
A. Prepared statements
B. Server-side input validation
C. Client-side input encoding
D. Disabled JavaScript filtering
عرض الإجابة
اجابة صحيحة: B
السؤال #27
A Chief Information Officer wants to implement a BYOD strategy for all company laptops and mobile phones. The Chief Information Security Officer is concerned with ensuring all devices are patched and running some sort of protection against malicious software. Which of the following existing technical controls should a security analyst recommend to best meet all the requirements?
A. EDR
B. Port security
C. NAC
D. Segmentation
عرض الإجابة
اجابة صحيحة: A
السؤال #28
As a proactive threat-hunting technique, hunters must develop situational cases based on likely attack scenarios derived from the available threat intelligence information. After forming the basis of the scenario, which of the following may the threat hunter construct to establish a framework for threat assessment?
A. Critical asset list
B. Threat vector
C. Attack profile
D. Hypothesis
عرض الإجابة
اجابة صحيحة: D
السؤال #29
A security analyst scans a host and generates the following output: Which of the following best describes the output? The output shows that port 80 is open and running an HTTP service, indicating that the host could potentially be vulnerable to web-based attacks.The other options are not relevant for this purpose: the host is responsive to the ICMP request, as shown by the ''Host is up'' message; the host is not running a mail server, as there is no SMTP or POP3 service detected; the host is not allowing u
Reference:According to the CompTIA CySA+ Study Guide: Exam CS0-003, 3rd Edition123, one of the objectives for the exam is to ''use appropriate tools and methods to manage, prioritize and respond to attacks and vulnerabilities''. The book also covers the usage and syntax of nmap, a popular network scanning tool, in chapter 5
A. he host is unresponsive to the ICMP request
B. he host Is running a vulnerable mall server
C. he host Is allowlng unsecured FTP connectlons
D. he host is vulnerable to web-based exploits
عرض الإجابة
اجابة صحيحة: D
السؤال #30
A recent penetration test discovered that several employees were enticed to assist attackers by visiting specific websites and running downloaded files when prompted by phone calls. Which of the following would best address this issue?
A. Increasing training and awareness for all staff
B. Ensuring that malicious websites cannot be visited
C. Blocking all scripts downloaded from the internet
D. Disabling all staff members ability to run downloaded applications
عرض الإجابة
اجابة صحيحة: A
السؤال #31
A company creates digitally signed packages for its devices. Which of the following best describes the method by which the security packages are delivered to the company's customers?
A. Antitamper mechanism
B. SELinux
C. Trusted firmware updates
D. eFuse
عرض الإجابة
اجابة صحيحة: C
السؤال #32
A security analyst notices the following proxy log entries: Which of the following is the user attempting to do based on the log entries?
A. Use a DoS attack on external hosts
B. Exfiltrate data
C. Scan the network
D. Relay email
عرض الإجابة
اجابة صحيحة: C
السؤال #33
The steering committee for information security management annually reviews the security incident register for the organization to look for trends and systematic issues. The steering committee wants to rank the risks based on past incidents to improve the security program for next year. Below is the incident register for the organization: Which of the following should the organization consider investing in first due to the potential impact of availability?
A. Hire a managed service provider to help with vulnerability management
B. Build a warm site in case of system outages
C. Invest in a failover and redundant system, as necessary
D. Hire additional staff for the IT department to assist with vulnerability management and log review
عرض الإجابة
اجابة صحيحة: C
السؤال #34
A security team conducts a lessons-learned meeting after struggling to determine who should conduct the next steps following a security event. Which of the following should the team create to address this issue? An incident response plan (IRP) is a document that defines the roles and responsibilities, procedures, and guidelines for responding to a security incident. It helps the security team to act quickly and effectively, minimizing the impact and cost of the incident. An IRP should specify who should con
A. ervice-level agreement
B. hange management plan
C. ncident response plan
D. emorandum of understanding
عرض الإجابة
اجابة صحيحة: C
السؤال #35
An organization's email account was compromised by a bad actor. Given the following information:Which of the following is the length of time the team took to detect the threat?
A. Data masking
B. Hashing
C. Watermarking
D. Encoding
عرض الإجابة
اجابة صحيحة: C
السؤال #36
During an incident response procedure, a security analyst acquired the needed evidence from the hard drive of a compromised machine. Which of the following actions should the analyst perform next to ensure the data integrity of the evidence?
A. Generate hashes for each file from the hard drive
B. Create a chain of custody document
C. Determine a timeline of events using correct time synchronization
D. Keep the cloned hard drive in a safe place
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: