Which type of adversary would commit cybercrimes with the authorization of their country’s government?
- A . state-sponsored
- B . hacktivist
- C . gray hat
- D . white hat
When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk?
- A . limiting
- B . assuming
- C . trasnferring
- D . avoiding
Which option describes a characteristic of a distributed denial-of-service attack?
- A . uses multiple types of malware to corrupt system services
- B . uses a single remote host to delete data from multiple target servers
- C . uses a single remote host to flood a target network with traffic
- D . uses a botnet to flood traffic to a target network
What is a component of a public key infrastructure?
- A . Key Distribution Center
- B . KDC ticket
- C . SSH key
- D . certificate authority
From which resource can a Palo Alto Networks firewall get URL category information for URLs whose categories cannot be found on the firewall?
- A . App-ID database
- B . WildFire
- C . PDF file
- D . PAN-DB database
What does a hypervisor enable?
- A . high-speed searching of already aggregated security log files
- B . high-speed aggregation and viewing of security log files
- C . multiple physical machines to be configured into a high-performance cluster
- D . multiple guest operating systems to run on a single physical machine
DRAG DROP
Match the Palo Alto Networks Wild Fire analysis verdict with its definition.
Explanation:
Reference: https://docs.paloaltonetworks.com/wildfire/8-0/wildfire-admin/wildfire-overview/wildfireconcepts/verdicts
Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.
- A . It cannot identify command-and-control traffic.
- B . It cannot monitor all potential network ports.
- C . It assumes that all internal devices are untrusted.
- D . It assumes that every internal endpoint can be trusted.
Which type of security device uses a single-pass, parallel processor hardware architecture to accelerate content inspection?
- A . unified threat management
- B . stateless firewalls
- C . next-generation firewall
- D . PoS-based firewall
Which well-known port is associated with the Simple Mail Transfer Protocol?
- A . 143
- B . 25
- C . 997
- D . 40
DRAG DROP
Match the common TCP/IP protocol with its corresponding port(s).
To which type of organization does the PCI DSS apply?
- A . any organization that accepts, transmits, or stores any cardholder data
- B . organizations that only accept cardholder data regardless of size or number of transactions
- C . only organization larger than 100 employees that accept, transmit, or store any cardholder data
- D . organization that only transmit data regardless of size or number of transactions
DRAG DROP
Match the task for server settings in group mapping with its order in the process.
Which mobile device management feature prevents jailbreaking or rooting?
- A . software distribution
- B . malware protection
- C . policy enforcement
- D . data loss prevention
Which device would an Evil Twin attack use to lure the victim to connect to the attack surface network?
- A . switch
- B . firewall
- C . router
- D . access point
What are two methods to securely transmit personally identifiable information? (Choose two.)
- A . data checksumming
- B . data fragmentation
- C . data encryption
- D . encrypted tunnels
What is the primary purpose of using encryption as part of your network data security architecture?
- A . authorization
- B . confidentiality
- C . integrity
- D . authentication
Which security component should be used to prevent a malware attack delivered by USB drive?
- A . endpoint security
- B . password security
- C . physical security
- D . firewall security