لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A company has determined that if its computer-based manufacturing is not functioning for 12 consecutive hours, it will lose more money that it costs to maintain the equipment. Which of the following must be less than 12 hours to maintain a positive total cost of ownership?
A. MTBF
B. RPO
C. RTO
D. MTTR
عرض الإجابة
اجابة صحيحة: A
السؤال #2
A database administrator needs to ensure all passwords are stored in a secure manner, so the administrate adds randomly generated data to each password before string. Which of the following techniques BEST explains this action?
A. Predictability
B. Key stretching
C. Salting
D. Hashing
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A software developer needs to perform code-execution testing, black-box testing, and non-functional testing on a new product before its general release. Which of the following BEST describes the tasks the developer is conducting?
A. Verification
B. Validation
C. Normalization
D. Staging
عرض الإجابة
اجابة صحيحة: E
السؤال #4
An organization's RPO for a critical system is two hours. The system is used Monday through Friday, from 9:00 am to 5:00 pm. Currently, the organization performs a full backup every Saturday that takes four hours to complete. Which of the following additional backup implementations would be the BEST way for the analyst to meet the business requirements?
A. Incremental backups Monday through Friday at 6:00 p
B. Full backups Monday through Friday at 6:00 p
C. incremental backups Monday through Friday at 6:00 p
D. Full backups Monday through Friday at 6:00 p
عرض الإجابة
اجابة صحيحة: A
السؤال #5
A security analyst discovers several .jpg photos from a cellular phone during a forensics investigation involving a compromised system. The analyst runs a forensics tool to gather file metadata. Which of the following would be part of the images if all the metadata is still intact?
A. The GPS location
B. When the file was deleted
C. The total number of print jobs
D. The number of copies made
عرض الإجابة
اجابة صحيحة: B
السؤال #6
A user reports constant lag and performance issues with the wireless network when working at a local coffee shop. A security analyst walks the user through an installation of Wireshark and get a five-minute pcap to analyze. The analyst observes the following output: Which of the following attacks does the analyst MOST likely see in this packet capture?
A. Session replay
B. Evil twin
C. Bluejacking
D. ARP poisoning
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which of the following is the purpose of a risk register?
A. To define the level or risk using probability and likelihood
B. To register the risk with the required regulatory agencies
C. To identify the risk, the risk owner, and the risk measures
D. To formally log the type of risk mitigation strategy the organization is using
عرض الإجابة
اجابة صحيحة: D
السؤال #8
An analyst needs to identify the applications a user was running and the files that were open before the user’s computer was shut off by holding down the power button. Which of the following would MOST likely contain that information?
A. NGFW
B. Pagefile
C. NetFlow
D. RAM
عرض الإجابة
اجابة صحيحة: D
السؤال #9
Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?
A. Footprinting
B. White-box testing
C. A drone/UAV
D. Pivoting
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A company needs to centralize its logs to create a baseline and have visibility on its security events. Which of the following technologies will accomplish this objective?
A. Security information and event management
B. A web application firewall
C. A vulnerability scanner
D. A next-generation firewall
عرض الإجابة
اجابة صحيحة: C
السؤال #11
A user recently attended an exposition and received some digital promotional materials The user later noticed blue boxes popping up and disappearing on the computer, and reported receiving several spam emails, which the user did not open Which of the following is MOST likely the cause of the reported issue?
A. There was a drive-by download of malware
B. The user installed a cryptominer
C. The OS was corrupted
D. There was malicious code on the USB drive
عرض الإجابة
اجابة صحيحة: C
السؤال #12
Which of the following disaster recovery tests is The LEAST time-consuming for the disaster recovery team?
A. Tabletop
B. Parallel
C. Full interruption
D. Simulation
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Employees are having issues accessing the company's website. Some employees report very slow performance, while others cannot the website at all. The web and security administrators search the logs and find millions of half-open connections to port 443 on the web server. Further analysis reveals thousands of different source IPs initiating this traffic. Which of the following attacks is MOST likely occurring?
A. DDoS
B. Man-in-the-middle
C. MAC flooding
D. Domain hijacking
عرض الإجابة
اجابة صحيحة: B
السؤال #14
Which of the following cloud models provides clients with servers, storage, and networks but nothing else?
A. SaaS
B. PaaS
C. IaaS
D. DaaS
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: