لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following ISO standards is certified for privacy?
A. ISO 9001
B. ISO 27002
C. ISO 27701
D. ISO 31000
عرض الإجابة
اجابة صحيحة: C
السؤال #2
A company Is concerned about is security after a red-team exercise. The report shows the team was able to reach the critical servers due to the SMB being exposed to the Internet and running NTLMV1, Which of the following BEST explains the findings?
A. Default settings on the servers
B. Unsecured administrator accounts
C. Open ports and services
D. Weak Data encryption
عرض الإجابة
اجابة صحيحة: C
السؤال #3
A security analyst is performing a forensic investigation compromised account credentials. Using the Event Viewer, the analyst able to detect the following message, ‘’Special privileges assigned to new login.’’ Several of these messages did not have a valid logon associated with the user before these privileges were assigned. Which of the following attacks is MOST likely being detected?
A. Pass-the-hash
B. Buffer overflow
C. Cross-site scripting
D. Session replay
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A multinational organization that offers web-based services has datacenters that are located only in the United States; however, a large number of its customers are in Australia, Europe, and China. Payments for services are managed by a third party in the United Kingdom that specializes in payment gateways. The management team is concerned the organization is not compliant with privacy laws that cover some of its customers. Which of the following frameworks should the management team follow?
A. Payment Card Industry Data Security Standard
B. Cloud Security Alliance Best Practices
C. ISO/IEC 27032 Cybersecurity Guidelines
D. General Data Protection Regulation
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which of the following would be BEST to establish between organizations to define the responsibilities of each party outline the key deliverables and include monetary penalties for breaches to manage third-party risk?
A. An ARO
B. An MOU
C. An SLA
D. A BPA
عرض الإجابة
اجابة صحيحة: BE
السؤال #6
The website http://companywebsite.com requires users to provide personal Information, Including security question responses, for registration. Which of the following would MOST likely cause a data breach?
A. Lack of input validation
B. Open permissions
C. Unsecure protocol
D. Missing patches
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which of the following would MOST likely support the integrity of a voting machine?
A. Asymmetric encryption
B. Blockchain
C. Transport Layer Security
D. Perfect forward secrecy
عرض الإجابة
اجابة صحيحة: D
السؤال #8
A security analyst is reviewing a new website that will soon be made publicly available. The analyst sees the following in the URL: http://dev-site.comptia.org/home/show.php?sessionID=77276554&loc=us The analyst then sends an internal user a link to the new website for testing purposes, and when the user clicks the link, the analyst is able to browse the website with the following URL: http://dev-site.comptia.org/home/show.php?sessionID=98988475&loc=us Which of the following application attacks is being tes
A. Pass-the-hash
B. Session replay
C. Object deference
D. Cross-site request forgery
عرض الإجابة
اجابة صحيحة: D
السؤال #9
A vulnerability assessment report will include the CVSS score of the discovered vulnerabilities because the score allows the organization to better.
A. validate the vulnerability exists in the organization's network through penetration testing
B. research the appropriate mitigation techniques in a vulnerability database
C. find the software patches that are required to mitigate a vulnerability
D. prioritize remediation of vulnerabilities based on the possible impact
عرض الإجابة
اجابة صحيحة: D
السؤال #10
An organization has decided to host its web application and database in the cloud Which of the following BEST describes the security concerns for this decision?
A. Access to the organization's servers could be exposed to other cloud-provider clients
B. The cloud vendor is a new attack vector within the supply chain
C. Outsourcing the code development adds risk to the cloud provider
D. Vendor support will cease when the hosting platforms reach EOL
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A500 is implementing an insider threat detection program, The primary concern is that users may be accessing confidential data without authorization. Which of the fallowing should be deployed to detect a potential insider threat?
A. A honeyfile
B. A DMZ
C. ULF
D. File integrity monitoring
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which of the following often operates in a client-server architecture to act as a service repository. providing enterprise consumers access to structured threat intelligence data?
A. STIX
B. CIRT
C. OSINT
D. TAXII
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Which of the following would be BEST to establish between organizations that have agreed cooperate and are engaged in early discussion to define the responsibilities of each party, but do not want to establish a contractually binding agreement?
A. An SLA
B. AnNDA
C. ABPA
D. AnMOU
عرض الإجابة
اجابة صحيحة: B
السؤال #14
A company is launching a new internet platform for its clients. The company does not want to implement its own authorization solution but instead wants to rely on the authorization provided by another platform. Which of the following is the BEST approach to implement the desired solution?
A. OAuth
B. TACACS+
C. SAML
D. RADIUS
عرض الإجابة
اجابة صحيحة: B
السؤال #15
A security administrator currently spends a large amount of time on common security tasks, such aa report generation, phishing investigations, and user provisioning and deprovisioning This prevents the administrator from spending time on other security projects. The business does not have the budget to add more staff members. Which of the following should the administrator implement?
A. DAC
B. ABAC
C. SCAP
D. SOAR
عرض الإجابة
اجابة صحيحة: C
السؤال #16
In which of the following risk management strategies would cybersecurity insurance be used?
A. Transference
B. Avoidance
C. Acceptance
D. Mitigation
عرض الإجابة
اجابة صحيحة: C
السؤال #17
A security analyst is configuring a large number of new company-issued laptops. The analyst received the following requirements: ? The devices will be used internationally by staff who travel extensively. ? Occasional personal use is acceptable due to the travel requirements. ? Users must be able to install and configure sanctioned programs and productivity suites. ? The devices must be encrypted ? The devices must be capable of operating in low-bandwidth environments. Which of the following would provide t
A. Configuring an always-on VPN
B. Implementing application whitelisting
C. Requiring web traffic to pass through the on-premises content filter
D. Setting the antivirus DAT update schedule to weekly
عرض الإجابة
اجابة صحيحة: A
السؤال #18
A security analyst reviews the datacenter access logs for a fingerprint scanner and notices an abundance of errors that correlate with users' reports of issues accessing the facility. Which of the following MOST likely the cause of the cause of the access issues?
A. False rejection
B. Cross-over error rate
C. Efficacy rale
D. Attestation
عرض الإجابة
اجابة صحيحة: B
السؤال #19
Which of the following would a European company interested in implementing a technical, hands-on set of security standards MOST likely choose?
A. GOPR
B. CIS controls
C. ISO 27001
D. ISO 37000
عرض الإجابة
اجابة صحيحة: A
السؤال #20
An attacker is attempting to exploit users by creating a fake website with the URL users. Which of the following social-engineering attacks does this describe?
A. Information elicitation
B. Typo squatting
C. Impersonation
D. Watering-hole attack
عرض الإجابة
اجابة صحيحة: D
السؤال #21
A pharmaceutical sales representative logs on to a laptop and connects to the public WiFi to check emails and update reports. Which of the following would be BEST to prevent other devices on the network from directly accessing the laptop? (Choose two.)
A. Trusted Platform Module
B. A host-based firewall
C. A DLP solution
D. Full disk encryption
E. A VPN
F. Antivirus software
عرض الإجابة
اجابة صحيحة: A
السؤال #22
A privileged user at a company stole several proprietary documents from a server. The user also went into the log files and deleted all records of the incident. The systems administrator has Just informed investigators that other log files are available for review. Which of the following did the administrator MOST likely configure that will assist the investigators?
A. Memory dumps
B. The syslog server
C. The application logs
D. The log retention policy
عرض الإجابة
اجابة صحيحة: C
السؤال #23
A smart retail business has a local store and a newly established and growing online storefront. A recent storm caused a power outage to the business and the local ISP, resulting in several hours of lost sales and delayed order processing. The business owner now needs to ensure two things: * Protection from power outages * Always-available connectivity In case of an outage The owner has decided to implement battery backups for the computer equipment Which of the following would BEST fulfill the owner's seco
A. Lease a point-to-point circuit to provide dedicated access
B. Connect the business router to its own dedicated UPS
C. Purchase services from a cloud provider for high availabilityD Replace the business's wired network with a wireless network
عرض الإجابة
اجابة صحيحة: C
السؤال #24
A security operations analyst is using the company's SIEM solution to correlate alerts. Which of the following stages of the incident response process is this an example of?
A. Eradication
B. Recovery
C. Identification
D. Preparation
عرض الإجابة
اجابة صحيحة: D
السؤال #25
An organization hired a consultant to assist with an active attack, and the consultant was able to identify the compromised accounts and computers. Which of the following is the consultant MOST likely to recommend to prepare for eradication?
A. Quarantining the compromised accounts and computers, only providing them with network access
B. Segmenting the compromised accounts and computers into a honeynet so as to not alert the attackers
C. Isolating the compromised accounts and computers, cutting off all network and internet access
D. Logging off and deleting the compromised accounts and computers to eliminate attacker access
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which of the following should be put in place when negotiating with a new vendor about the timeliness of the response to a significant outage or incident?
A. MOU
B. MTTR
C. SLA
D. NDA
عرض الإجابة
اجابة صحيحة: A
السؤال #27
While reviewing the wireless router, the systems administrator of a small business determines someone is spoofing the MAC address of an authorized device. Given the table below: Which of the following should be the administrator's NEXT step to detect if there is a rogue system without impacting availability?
A. Conduct a ping sweep
B. Physically check each system,
C. Deny Internet access to the "UNKNOWN" hostname
D. Apply MAC filtering,
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: