لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following would be the BEST method for creating a detailed diagram of wireless access points and hot-spots?
A. Footprinting
B. White-box testing
C. A drone/UAV
D. Pivoting
عرض الإجابة
اجابة صحيحة: B
السؤال #2
A security analyst is logged into a Windows file server and needs to see who is accessing files and from which computers Which of the following tools should the analyst use?
A. netstat
B. net share
C. netcat
D. nbtstat
E. net session
عرض الإجابة
اجابة صحيحة: B
السؤال #3
A security administrator needs to create a RAID configuration that is focused on high read speeds and fault tolerance. It is unlikely that multiple drivers will fail simultaneously. Which of the following RAID configurations should the administration use?
A. RA1D 0
B. RAID1
C. RAID 5
D. RAID 10
عرض الإجابة
اجابة صحيحة: C
السؤال #4
A Chief Security Officer is looking for a solution that can reduce the occurrence of customers receiving errors from back-end infrastructure when systems go offline unexpectedly. The security architect would like the solution to help maintain session persistence. Which of the following would BEST meet the requirements?
A. Reverse proxy
B. NIC teaming
C. Load balancer
D. Forward proxy
عرض الإجابة
اجابة صحيحة: C
السؤال #5
Which of the following controls is used to make an organization initially aware of a data compromise?
A. Protective
B. Preventative
C. Corrective
D. Detective
عرض الإجابة
اجابة صحيحة: A
السؤال #6
During an incident response process involving a laptop, a host was identified as the entry point for malware. The management team would like to have the laptop restored and given back to the user. The cybersecurity analyst would like to continue investigating the intrusion on the host. Which of the following would allow the analyst to continue the investigation and also return the laptop to the user as soon as possible?
A. dd
B. memdump
C. tcpdump
D. head
عرض الإجابة
اجابة صحيحة: D
السؤال #7
A network administrator is setting up wireless access points in all the conference rooms and wants to authenticate device using PKI. Which of the following should the administrator configure?
A. A captive portal
B. PSK
C. 802
D. WPS
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A security modern may have occurred on the desktop PC of an organization's Chief Executive Officer (CEO) A duplicate copy of the CEO's hard drive must be stored securely to ensure appropriate forensic processes and the chain of custody are followed. Which of the following should be performed to accomplish this task?
A. Install a new hard drive in the CEO's PC, and then remove the old hard drive and place it in a tamper-evident bag
B. Connect a write blocker to the hard drive Then leveraging a forensic workstation, utilize the dd command m a live Linux environment to create a duplicate copy
C. Remove the CEO's hard drive from the PC, connect to the forensic workstation, and copy all the contents onto a remote fileshare while the CEO watches
D. Refrain from completing a forensic analysts of the CEO's hard drive until after the incident is confirmed, duplicating the hard drive at this stage could destroy evidence
عرض الإجابة
اجابة صحيحة: B
السؤال #9
An organization's RPO for a critical system is two hours. The system is used Monday through Friday, from 9:00 am to 5:00 pm. Currently, the organization performs a full backup every Saturday that takes four hours to complete. Which of the following additional backup implementations would be the BEST way for the analyst to meet the business requirements?
A. Incremental backups Monday through Friday at 6:00 p
B. Full backups Monday through Friday at 6:00 p
C. incremental backups Monday through Friday at 6:00 p
D. Full backups Monday through Friday at 6:00 p
عرض الإجابة
اجابة صحيحة: A
السؤال #10
While preparing a software Inventory report, a security analyst discovers an unauthorized program installed on most of the company's servers. The program utilizes the same code signing certificate as an application deployed to only the accounting team. Which of the following mitigations would BEST secure the server environment?
A. Revoke the code signing certificate used by both programs
B. Block all unapproved file hashes from installation
C. Add the accounting application file hash to the allowed list
D. Update the code signing certificate for the approved application
عرض الإجابة
اجابة صحيحة: B
السؤال #11
A network administrator has been asked to design a solution to improve a company's security posture The administrator is given the following, requirements? ? The solution must be inline in the network ? The solution must be able to block known malicious traffic ? The solution must be able to stop network-based attacks Which of the following should the network administrator implement to BEST meet these requirements?
A. HIDS
B. NIDS
C. HIPS
D. NIPS
عرض الإجابة
اجابة صحيحة: D
السؤال #12
A startup company is using multiple SaaS and IaaS platforms to stand up a corporate infrastructure and build out a customer-facing web application. Which of the following solutions would be BEST to provide security, manageability, and visibility into the platforms?
A. SIEM
B. DLP
C. CASB
D. SWG
عرض الإجابة
اجابة صحيحة: D
السؤال #13
A news article states that a popular web browser deployed on all corporate PCs is vulnerable to a zero-day attack. Which of the following MOST concerns the Chief Information Security Officer about the information in the news article?
A. Insider threats have compromised this network
B. Web browsing is not functional for the entire network
C. Antivirus signatures are required to be updated immediately
D. No patches are available for the web browser
عرض الإجابة
اجابة صحيحة: A
السؤال #14
A company's security team received notice of a critical vulnerability affecting a high-profile device within the web infrastructure. The vendor patch was just made available online but has not yet been regression tested in development environments. In the interim, firewall rules were implemented to reduce the access to the interface affected by the vulnerability. Which of the following controls does this scenario describe?
A. Deterrent
B. Compensating
C. Detective
D. Preventive
عرض الإجابة
اجابة صحيحة: A
السؤال #15
A user wanted to catch up on some work over the weekend but had issues logging in to the corporate network using a VPN. On Monday, the user opened a ticket for this issue but was able to log in successfully. Which of the following BEST describes the policy that is being implemented?
A. Time-based logins
B. Geofencing
C. Network location
D. Password history
عرض الإجابة
اجابة صحيحة: B
السؤال #16
During a recent security incident at a multinational corporation a security analyst found the following logs for an account called user: Which Of the following account policies would BEST prevent attackers from logging in as user?
A. Impossible travel time
B. Geofencing
C. Time-based logins
D. Geolocation
عرض الإجابة
اجابة صحيحة: C
السؤال #17
A financial analyst is expecting an email containing sensitive information from a client. When the email arrives, the analyst receives an error and is unable to open the encrypted message. Which of the following is the MOST likely cause of the issue?
A. The S/MME plug-in is not enabled
B. The SLL certificate has expired
C. Secure IMAP was not implemented
D. POP3S is not supported
عرض الإجابة
اجابة صحيحة: A
السؤال #18
An organization wants to implement a third factor to an existing multifactor authentication. The organization already uses a smart card and password. Which of the following would meet the organization’s needs for a third factor?
A. Date of birth
B. Fingerprints
C. PIN
D. TPM
عرض الإجابة
اجابة صحيحة: B
السؤال #19
To secure an application after a large data breach, an e-commerce site will be resetting all users’ credentials. Which of the following will BEST ensure the site’s users are not compromised after the reset?
A. A password reuse policy
B. Account lockout after three failed attempts
C. Encrypted credentials in transit
D. A geofencing policy based on login history
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Which of the following would BEST identify and remediate a data-loss event in an enterprise using third-party, web-based services and file-sharing platforms?
A. SIEM
B. CASB
C. UTM
D. DLP
عرض الإجابة
اجابة صحيحة: C
السؤال #21
A security analyst is reviewing information regarding recent vulnerabilities. Which of the following will the analyst MOST likely consult to validate which platforms have been affected?
A. SINT
B. SIEM
C. CVSS
D. CVE
عرض الإجابة
اجابة صحيحة: AC
السؤال #22
A security audit has revealed that a process control terminal is vulnerable to malicious users installing and executing software on the system. The terminal is beyond end-of-life support and cannot be upgraded, so it is placed on a projected network segment. Which of the following would be MOST effective to implement to further mitigate the reported vulnerability?
A. DNS sinkholding
B. DLP rules on the terminal
C. An IP blacklist
D. Application whitelisting
عرض الإجابة
اجابة صحيحة: B
السؤال #23
A cybersecurity analyst needs to implement secure authentication to third-party websites without users’ passwords. Which of the following would be the BEST way to achieve this objective?
A. OAuth
B. SSO
C. SAML
D. PAP
عرض الإجابة
اجابة صحيحة: D
السؤال #24
A security engineer is deploying a new wireless for a company. The company shares office space with multiple tenants. Which of the following should the engineer configured on the wireless network to ensure that confidential data is not exposed to unauthorized users?
A. EAP
B. TLS
C. HTTPS
D. AES
عرض الإجابة
اجابة صحيحة: D
السؤال #25
A user reports falling for a phishing email to an analyst. Which of the following system logs would the analyst check FIRST?
A. DNS
B. Message gateway
C. Network
D. Authentication
عرض الإجابة
اجابة صحيحة: A
السؤال #26
Which of the fofowing should an organization conskier implementing in the event executives need to speak to the media after a publicized data breach?
A. incident response pian
B. Business continuity plan
C. Communication pian
D. Disaster recovery plan
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: