لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A company's help desk has received calls about the wireless network being down and users being unable to connect to it The network administrator says all access points are up and running One of the help desk technicians notices the affected users are working in a building near the parking lot. Which of the following is the most likely reason for the outage?
A. Someone near the building is jamming the signal
B. A user has set up a rogue access point near the building
C. Someone set up an evil twin access point in the affected area
D. The APs in the affected area have been unplugged from the network
عرض الإجابة
اجابة صحيحة: C
السؤال #2
Which of the following is required in order for an IDS and a WAF to be effective on HTTPS traffic?
A. Hashing
B. DNS sinkhole
C. TLS inspection
D. Data masking
عرض الإجابة
اجابة صحيحة: E
السؤال #3
The following are the logs of a successful attack. Which of the following controls would be BEST to use to prevent such a breach in the future?
A. Password history
B. Account expiration
C. Password complexity
D. Account lockout
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Which of the following would MOST likely be identified by a credentialed scan but would be missed by an uncredentialed scan?
A. Vulnerabilities with a CVSS score greater than 6
B. Critical infrastructure vulnerabilities on non-IP protocols
C. CVEs related to non-Microsoft systems such as printers and switches
D. Missing patches for third-party software on Windows workstations and servers
عرض الإجابة
اجابة صحيحة: C
السؤال #5
A security researcher is using an adversary's infrastructure and TTPs and creating a named group to track those targeted Which of the following is the researcher MOST likely using?
A. The Cyber Kill Chain
B. The incident response process
C. The Diamond Model of Intrusion Analysis
D. MITRE ATT&CK
عرض الإجابة
اجابة صحيحة: B
السؤال #6
A client sent several inquiries to a project manager about the delinquent delivery status of some critical reports. The project manager claimed the reports were previously sent via email, but then quickly generated and backdated the reports before submitting them as plain text within the body of a new email message thread. Which of the following actions MOST likely supports an investigation for fraudulent submission?
A. Establish chain of custody
B. Inspect the file metadata
C. Reference the data retention policy
D. Review the email event logs
عرض الإجابة
اجابة صحيحة: A
السؤال #7
After a hardware incident, an unplanned emergency maintenance activity was conducted to rectify the issue. Multiple alerts were generated on the SIEM during this period of time. Which of the following BEST explains what happened?
A. The unexpected traffic correlated against multiple rules, generating multiple alerts
B. Multiple alerts were generated due to an attack occurring at the same time
C. An error in the correlation rules triggered multiple alerts
D. The SIEM was unable to correlate the rules, triggering the alert
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A Chief Information Security Officer (CISO) is evaluating (he dangers involved in deploying a new ERP system tor the company. The CISO categorizes the system, selects the controls mat apply to the system, implements the controls, and then assesses the success of the controls before authorizing the system Which of the following is the CISO using to evaluate Hie environment for this new ERP system?
A. The Diamond Model of Intrusion Analysis
B. CIS Critical Security Controls
C. NIST Risk Management Framevtoik
D. ISO 27002
عرض الإجابة
اجابة صحيحة: B
السؤال #9
An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO)
A. MAC filtering
B. Zero trust segmentation
C. Network access control
D. Access control vestibules
E. Guards
F. Bollards
عرض الإجابة
اجابة صحيحة: D
السؤال #10
After gaining access to a dual-homed (i.e.. wired and wireless) multifunction device by exploiting a vulnerability in the device's firmware, a penetration tester then gains shell access on another networked asset This technique is an example of:
A. privilege escalation
B. footprinting
C. persistence
D. pivoting
عرض الإجابة
اجابة صحيحة: D
السؤال #11
An organization recently acquired an ISO 27001 certification. Which of the following would MOST likely be considered a benefit of this certification?
A. It allows for the sharing of digital forensics data across organizations
B. It provides insurance in case of a data breach
C. It provides complimentary training and certification resources to IT security staff
D. It certifies the organization can work with foreign entities that require a security clearance
E. It assures customers that the organization meets security standards
عرض الإجابة
اجابة صحيحة: A
السؤال #12
A new plug-and-play storage device was installed on a PC in the corporate environment. Which of the following safeguards will BEST help to protect the PC from malicious files on the storage device?
A. Change the default settings on the PC
B. Define the PC firewall rules to limit access
C. Encrypt the disk on the storage device
D. Plug the storage device in to the UPS
عرض الإجابة
اجابة صحيحة: B
السؤال #13
Which of the following function as preventive, detective, and deterrent controls to reduce the risk of physical theft? (Select TWO).
A. Mantraps
B. Security guards
C. Video surveillance
D. Fences
E. Bollards
F. Antivirus
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Which of the following cryptographic concepts would a security engineer utilize while implementing non-repudiation? (Select TWO)
A. Block cipher
B. Hashing
C. Private key
D. Perfect forward secrecy
E. Salting
F. Symmetric keys
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which Of the following security controls can be used to prevent multiple from using a unique card swipe and being admitted to a entrance?
A. Visitor logs
B. Faraday cages
C. Access control vestibules
D. Motion detection sensors
عرض الإجابة
اجابة صحيحة: C
السؤال #16
Which of the following environments typically hosts the current version configurations and code, compares user-story responses and workflow, and uses a modified version of actual data for testing?
A. Development
B. Staging
C. Production
D. Test
عرض الإجابة
اجابة صحيحة: B
السؤال #17
A security architect is implementing a new email architecture for a company. Due to security concerns, the Chief Information Security Officer would like the new architecture to support email encryption, as well as provide for digital signatures. Which of the following should the architect implement?
A. TOP
B. IMAP
C. HTTPS
D. S/MIME
عرض الإجابة
اجابة صحيحة: BC

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: