لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
After entering a username and password, and administrator must gesture on a touch screen. Which of the following demonstrates what the administrator is providing?
A. Multifactor authentication
B. Something you can do
C. Biometric
D. Two-factor authentication
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A nuclear plant was the victim of a recent attack, and all the networks were air gapped. A subsequent investigation revealed a worm as the source of the issue. Which of the following BEST explains what happened?
A. A malicious USB was introduced by an unsuspecting employee
B. The ICS firmware was outdated
C. A local machine has a RAT installed
D. The HVAC was connected to the maintenance vendor
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A company has limited storage available and online presence that cannot for more than four hours. Which of the following backup methodologies should the company implement to allow for the FASTEST database restore time In the event of a failure, which being maindful of the limited available storage space?
A. Implement fulltape backup every Sunday at 8:00 p
B. Implement different backups every Sunday at 8:00 and nightly incremental backups at 8:00 p
C. Implement nightly full backups every Sunday at 8:00 p
D. Implement full backups every Sunday at 8:00 p
عرض الإجابة
اجابة صحيحة: AD
السؤال #4
A public relations team will be taking a group of guest on a tour through the facility of a large e-commerce company. The day before the tour, the company sends out an email to employees to ensure all whiteboars are cleaned and all desks are cleared. The company is MOST likely trying to protect against.
A. Loss of proprietary information
B. Damage to the company’s reputation
C. Social engineering
D. Credential exposure
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Phishing and spear-phishing attacks have been occurring more frequently against a company’s staff. Which of the following would MOST likely help mitigate this issue?
A. DNSSEC and DMARC
B. DNS query logging
C. Exact mail exchanger records in the DNS
D. The addition of DNS conditional forwarders
عرض الإجابة
اجابة صحيحة: D
السؤال #6
To secure an application after a large data breach, an e-commerce site will be resetting all users’ credentials. Which of the following will BEST ensure the site’s users are not compromised after the reset?
A. A password reuse policy
B. Account lockout after three failed attempts
C. Encrypted credentials in transit
D. A geofencing policy based on login history
عرض الإجابة
اجابة صحيحة: C
السؤال #7
A well-known organization has been experiencing attacks from APIs. The organization is concerned that custom malware is being created and emailed into the company or installed on USB sticks that are dropped in parking lots. Which of the following is the BEST defense against this scenario?
A. Configuring signature-based antivirus io update every 30 minutes
B. Enforcing S/MIME for email and automatically encrypting USB drives upon insertion
C. Implementing application execution in a sandbox for unknown software
D. Fuzzing new files for vulnerabilities if they are not digitally signed
عرض الإجابة
اجابة صحيحة: B
السؤال #8
A system administrator needs to implement an access control scheme that will allow an object’s access policy be determined by its owner. Which of the following access control schemes BEST fits the requirements?
A. Role-based access control
B. Discretionary access control
C. Mandatory access control
D. Attribute-based access control
عرض الإجابة
اجابة صحيحة: A
السؤال #9
An organization's Chief Security Officer (CSO) wants to validate the business's involvement in the incident response plan to ensure its validity and thoroughness. Which of the following will the CSO MOST likely use?
A. An external security assessment
B. A bug bounty program
C. A tabletop exercise
D. A red-team engagement
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A cybersecurity administrator has a reduced team and needs to operate an on-premises network and security infrastructure efficiently. To help with the situation, the administrator decides to hire a service provider. Which of the following should the administrator use?
A. SDP
B. AAA
C. IaaS
D. MSSP
E. Microservices
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which of the following refers to applications and systems that are used within an organization without consent or approval?
A. Shadow IT
B. OSINT
C. Dark web
D. Insider threats
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which of the following will provide the BEST physical security countermeasures to stop intruders? (Select TWO.)
A. Alarms
B. Signage
C. Lighting
D. Mantraps
E. Fencing
F. Sensors
عرض الإجابة
اجابة صحيحة: D
السؤال #13
A company recently transitioned to a strictly BYOD culture due to the cost of replacing lost or damaged corporate-owned mobile devices. Which of the following technologies would be BEST to balance the BYOD culture while also protecting the company’s data?
A. Containerization
B. Geofencing
C. Full-disk encryption
D. Remote wipe
عرض الإجابة
اجابة صحيحة: DF
السؤال #14
Which of the following would BEST identify and remediate a data-loss event in an enterprise using third-party, web-based services and file-sharing platforms?
A. SIEM
B. CASB
C. UTM
D. DLP
عرض الإجابة
اجابة صحيحة: C
السؤال #15
A security analyst receives a SIEM alert that someone logged in to the appadmin test account, which is only used for the early detection of attacks. The security analyst then reviews the following application log: Which of the following can the security analyst conclude?
A. A replay attack is being conducted against the application
B. An injection attack is being conducted against a user authentication system
C. A service account password may have been changed, resulting in continuous failed logins within the application
D. A credentialed vulnerability scanner attack is testing several CVEs against the application
عرض الإجابة
اجابة صحيحة: B
السؤال #16
An organization has hired a security analyst to perform a penetration test. The analyst captures 1Gb worth of inbound network traffic to the server and transfer the pcap back to the machine for analysis. Which of the following tools should the analyst use to further review the pcap?
A. Nmap
B. cURL
C. Netcat
D. Wireshark
عرض الإجابة
اجابة صحيحة: C
السؤال #17
A RAT that was used to compromise an organization’s banking credentials was found on a user’s computer. The RAT evaded antivirus detection. It was installed by a user who has local administrator rights to the system as part of a remote management tool set. Which of the following recommendations would BEST prevent this from reoccurring?
A. Create a new acceptable use policy
B. Segment the network into trusted and untrusted zones
C. Enforce application whitelisting
D. Implement DLP at the network boundary
عرض الإجابة
اجابة صحيحة: D
السؤال #18
The IT department’s on-site developer has been with the team for many years. Each time an application is released, the security team is able to identify multiple vulnerabilities. Which of the following would BEST help the team ensure the application is ready to be released to production?
A. Limit the use of third-party libraries
B. Prevent data exposure queries
C. Obfuscate the source code
D. Submit the application to QA before releasing it
عرض الإجابة
اجابة صحيحة: A
السؤال #19
To reduce costs and overhead, an organization wants to move from an on-premises email solution to a cloud-based email solution. At this time, no other services will be moving. Which of the following cloud models would BEST meet the needs of the organization?
A. MaaS
B. laaS
C. SaaS
D. PaaS
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: