لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A network analyst is setting up a wireless access point for a home office in a remote, rural location. The requirement is that users need to connect to the access point securely but do not want to have to remember passwords Which of the following should the network analyst enable to meet the requirement?
A. MAC address filtering
B. 802
C. Captive portal
D. WPS
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Certain users are reporting their accounts are being used to send unauthorized emails and conduct suspicious activities. After further investigation, a security analyst notices the following: ? All users share workstations throughout the day. ? Endpoint protection was disabled on several workstations throughout the network. ? Travel times on logins from the affected users are impossible. ? Sensitive data is being uploaded to external sites. ? All user account passwords were forced to be reset and the issue
A. Brute-force
B. Keylogger
C. Dictionary
D. Rainbow
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A security analyst notices an unusual amount of traffic hitting the edge of the network. Upon examining the logs, the analyst identifies a source IP address and blocks that address from communicating with the network. Even though the analyst is blocking this address, the attack is still ongoing and coming from a large number of different source IP addresses. Which of the following describes this type of attack?
A. DDoS
B. Privilege escalation
C. DNS poisoning
D. Buffer overflow
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A security administrator is using UDP port 514 to send a syslog through an unsecure network to the SIEM server. Which of the following is the best way for the administrator to improve the process?
A. Change the protocol to TCP
B. Add LDAP authentication to the SIEM server
C. Use a VPN from the internal server to the SIEM and enable DLP
D. Add SSL/TLS encryption and use a TCP 6514 port to send logs
عرض الإجابة
اجابة صحيحة: A
السؤال #5
An organization needs to implement more stringent controls over administrator/root credentials and service accounts. Requirements for the project include: * Check-in/checkout of credentials * The ability to use but not know the password * Automated password changes * Logging of access to credentials Which of the following solutions would meet the requirements?
A. OAuth 2
B. Secure Enclave
C. A privileged access management system
D. An OpenID Connect authentication system
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A security analyst is hardening a network infrastructure The analyst is given the following requirements ? Preserve the use of public IP addresses assigned to equipment on the core router ? Enable "in transport" encryption protection to the web server with the strongest ciphers. Which of the following should the analyst implement to meet these requirements? (Select two).
A. Configure VLANs on the core router
B. Configure NAT on the core router
C. Configure BGP on the core router
D. Enable AES encryption on the web server
E. Enable 3DES encryption on the web server
F. Enable TLSv2 encryption on the web server
عرض الإجابة
اجابة صحيحة: B
السؤال #7
A company is concerned about individuals driving a car into the building to gain access. Which of the following security controls would work BEST to prevent this from happening?
A. Bollard
B. Camera
C. Alarms
D. Signage
E. Access control vestibule
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which of the following would be best to ensure data is saved to a location on a server, is easily scaled, and is centrally monitored?
A. Edge computing
B. Microservices
C. Containers
D. Thin client
عرض الإجابة
اجابة صحيحة: C
السؤال #9
An organization is concerned about hackers potentially entering a facility and plugging in a remotely accessible Kali Linux box. Which of the following should be the first lines of defense against such an attack? (Select TWO).
A. MAC filtering
B. Zero trust segmentation
C. Network access control
D. Access control vestibules
E. Guards
F. Bollards
عرض الإجابة
اجابة صحيحة: C
السؤال #10
Which of the following teams combines both offensive and defensive testing techniques to protect an organization's critical systems?
A. Red
B. Blue
C. Purple
D. Yellow
عرض الإجابة
اجابة صحيحة: D
السؤال #11
A security administrator recently used an internal CA to issue a certificate to a public application. A user tries to reach the application but receives a message stating, “Your connection is not private." Which of the following is the best way to fix this issue?
A. Ignore the warning and continue to use the application normally
B. Install the certificate on each endpoint that needs to use the application
C. Send the new certificate to the users to install on their browsers
D. Send a CSR to a known CA and install the signed certificate on the application's server
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: