Which well-known port is associated with the Simple Mail Transfer Protocol?
Which well-known port is associated with the Simple Mail Transfer Protocol?A . 143B . 25C . 997D . 40View AnswerAnswer: B
Which protocol converts voice into a digital signal?
Which protocol converts voice into a digital signal?A . IVOB . VoIPC . SNMPD . IGMPView AnswerAnswer: B
To which type of organization does the PCI DSS apply?
To which type of organization does the PCI DSS apply?A . any organization that accepts, transmits, or stores any cardholder dataB . organizations that only accept cardholder data regardless of size or number of transactionsC . only organization larger than 100 employees that accept, transmit, or store any cardholder dataD...
What does a hypervisor enable?
What does a hypervisor enable?A . high-speed searching of already aggregated security log filesB . high-speed aggregation and viewing of security log filesC . multiple physical machines to be configured into a high-performance clusterD . multiple guest operating systems to run on a single physical machineView AnswerAnswer: D
Match the task for server settings in group mapping with its order in the process
DRAG DROP Match the task for server settings in group mapping with its order in the process. View AnswerAnswer:
What is a component of a public key infrastructure?
What is a component of a public key infrastructure?A . Key Distribution CenterB . KDC ticketC . SSH keyD . certificate authorityView AnswerAnswer: D
Which option describes a characteristic of a distributed denial-of-service attack?
Which option describes a characteristic of a distributed denial-of-service attack?A . uses multiple types of malware to corrupt system servicesB . uses a single remote host to delete data from multiple target serversC . uses a single remote host to flood a target network with trafficD . uses a botnet...
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?A . strong endpoint passwordsB . endpoint disk encryptionC . endpoint antivirus softwareD . endpoint NIC ACLsView AnswerAnswer: C
Match each option with the term it describes
DRAG DROP Match each option with the term it describes. View AnswerAnswer:
From which resource can a Palo Alto Networks firewall get URL category information for URLs whose categories cannot be found on the firewall?
From which resource can a Palo Alto Networks firewall get URL category information for URLs whose categories cannot be found on the firewall?A . App-ID databaseB . WildFireC . PDF fileD . PAN-DB databaseView AnswerAnswer: D