لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
A security analyst is reviewing packet capture data from a compromised host On the In the packet capture. analyst locates packets that contain large of text, Which Of following is most likely installed on compromised host?
A. Keylogger
B. Spyware
C. Torjan
D. Ransomware
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which of the following types of controls is a turnstile?
A. Physical
B. Detective
C. Corrective
D. Technical
عرض الإجابة
اجابة صحيحة: D
السؤال #3
Given the following snippet of Python code: Which of the following types of malware MOST likely contains this snippet?
A. Logic bomb
B. Keylogger
C. Backdoor
D. Ransomware
عرض الإجابة
اجابة صحيحة: D
السؤال #4
A web server log contains two million lines. A security analyst wants to obtain the next 500 lines starting from line 4,600. Which of the following commands will help the security analyst to achieve this objective?
A. cat webserver
B. cat webserver
C. cat webserver
D. cat webserver
عرض الإجابة
اجابة صحيحة: D
السؤال #5
An attacker is targeting a company. The attacker notices that the company’s employees frequently access a particular website. The attacker decides to infect the website with malware and hopes the employees’ devices will also become infected. Which of the following techniques is the attacker using?
A. Watering-hole attack
B. Pretexting
C. Typosquatting
D. Impersonation
عرض الإجابة
اجابة صحيحة: C
السؤال #6
A security analyst is investigating a report from a penetration test. During the penetration test, consultants were able to download sensitive data from a back-end server. The back-end server was exposing an API that should have only been available from the companVs mobile application. After reviewing the back-end server logs, the security analyst finds the following entries Which of the following is the most likely cause of the security control bypass?
A. IP address allow list
B. user-agent spoofing
C. WAF bypass
D. Referrer manipulation
عرض الإجابة
اجابة صحيحة: BEF
السؤال #7
A company is moving its retail website to a public cloud provider. The company wants to tokenize audit card data but not allow the cloud provider to see the stored credit card information. Which of the following would BEST meet these objectives?
A. WAF
B. CASB
C. VPN
D. TLS
عرض الإجابة
اجابة صحيحة: A
السؤال #8
A systems administrator is required to enforce MFA for corporate email account access, relying on the possession factor. Which of the following authentication methods should the systems administrator choose? (Select two).
A. passphrase
B. Time-based one-time password
C. Facial recognition
D. Retina scan
E. Hardware token
F. Fingerprints
عرض الإجابة
اجابة صحيحة: C
السؤال #9
A cybersecurity analyst needs to adopt controls to properly track and log user actions to an individual. Which of the following should the analyst implement?
A. Non-repudiation
B. Baseline configurations
C. MFA
D. DLP
عرض الإجابة
اجابة صحيحة: B
السؤال #10
An organization discovered a disgruntled employee exfiltrated a large amount of PII data by uploading files Which of the following controls should the organization consider to mitigate this risk?
A. EDR
B. Firewall
C. HIPS
D. DLP
عرض الإجابة
اجابة صحيحة: B
السؤال #11
Which Of the following will provide the best physical security countermeasures to Stop intruders? (Select two).
A. Alarm
B. Signage
C. Lighting
D. Access control vestibules
E. Fencing
F. Sensors
عرض الإجابة
اجابة صحيحة: A
السؤال #12
Which of the following supplies non-repudiation during a forensics investigation?
A. Dumping volatile memory contents first
B. Duplicating a drive with dd
C. Using a SHA-2 signature of a drive image
D. Logging everyone in contact with evidence
E. Encrypting sensitive data
عرض الإجابة
اجابة صحيحة: A
السؤال #13
An organization is moving away from the use of client-side and server-side certificates for EAR The company would like for the new EAP solution to have the ability to detect rogue access points. Which of the following would accomplish these requirements?
A. PEAP
B. EAP-FAST
C. EAP-TLS
D. EAP-TTLS
عرض الإجابة
اجابة صحيحة: B
السؤال #14
A Chief Information Security Officer (CISO) wants to implement a new solution that can protect against certain categories of websites, whether the employee is in the offer or away. Which of the following solutions should the CISO implement?
A. VAF
B. SWG
C. VPN
D. WDS
عرض الإجابة
اجابة صحيحة: BE
السؤال #15
A security engineer obtained the following output from a threat intelligence source that recently performed an attack on the company's server: Which of the following best describes this kind of attack?
A. Directory traversal
B. SQL injection
C. API
D. Request forgery
عرض الإجابة
اجابة صحيحة: B
السؤال #16
Which of the following would produce the closet experience of responding to an actual incident response scenario?
A. Lessons learned
B. Simulation
C. Walk-through
D. Tabletop
عرض الإجابة
اجابة صحيحة: B
السؤال #17
An analyst is working on an email security incident in which the target opened an attachment containing a worm. The analyst wants to implement mitigation techniques to prevent further spread. Which of the following is the BEST course of action for the analyst to take?
A. Apply a DLP solution
B. Implement network segmentation
C. Utilize email content filtering,
D. isolate the infected attachment
عرض الإجابة
اجابة صحيحة: D
السؤال #18
A security analyst was deploying a new website and found a connection attempting to authenticate on the site's portal. While Investigating The incident, the analyst identified the following Input in the username field: Which of the following BEST explains this type of attack?
A. DLL injection to hijack administrator services
B. SQLi on the field to bypass authentication
C. Execution of a stored XSS on the website
D. Code to execute a race condition on the server
عرض الإجابة
اجابة صحيحة: C
السؤال #19
While performing a threat-hunting exercise, a security analyst sees some unusual behavior occurring in an application when a user changes the display name. The security analyst decides to perform a static code analysis and receives the following pseudocode: Which of the following attack types best describes the root cause of the unusual behavior?
A. Server-side request forgery
B. Improper error handling
C. Buffer overflow
D. SQL injection
عرض الإجابة
اجابة صحيحة: D
السؤال #20
A security administrator needs to add fault tolerance and load balancing to the connection from the file server to the backup storage. Which of the following is the best choice to achieve this objective?
A. Multipathing
B. RAID
C. Segmentation
D. 8021
عرض الإجابة
اجابة صحيحة: D

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: