Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.
Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.A . It cannot identify command-and-control traffic.B . It cannot monitor all potential network ports.C . It assumes that all internal devices are untrusted.D . It assumes that every internal endpoint can be trusted.View AnswerAnswer: D
A firewall located on an organization’s network perimeter can be used to protect against which type of attack?
A firewall located on an organization’s network perimeter can be used to protect against which type of attack?A . a malicious SaaS application file accessed from an unmanaged mobile phoneB . ransomware installed from an infected USB driveC . malware installed on the laptop by a disgruntled employeeD . a...
When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk?
When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk?A . limitingB . assumingC . trasnferringD . avoidingView AnswerAnswer: A
Which mobile device management feature prevents jailbreaking or rooting?
Which mobile device management feature prevents jailbreaking or rooting?A . software distributionB . malware protectionC . policy enforcementD . data loss preventionView AnswerAnswer: C
Which security component should be used to prevent a malware attack delivered by USB drive?
Which security component should be used to prevent a malware attack delivered by USB drive?A . endpoint securityB . password securityC . physical securityD . firewall securityView AnswerAnswer: C
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans and rootkits?
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans and rootkits?A . AutoFocusB . TrapsC . ExpeditionD . App-IDView AnswerAnswer: B
Match the tool to its capability
DRAG DROP Match the tool to its capability. View AnswerAnswer:
Which device would an Evil Twin attack use to lure the victim to connect to the attack surface network?
Which device would an Evil Twin attack use to lure the victim to connect to the attack surface network?A . switchB . firewallC . routerD . access pointView AnswerAnswer: D
Which type of adversary would commit cybercrimes with the authorization of their country’s government?
Which type of adversary would commit cybercrimes with the authorization of their country’s government?A . state-sponsoredB . hacktivistC . gray hatD . white hatView AnswerAnswer: A
Match each type of breach to its consequence
DRAG DROP Match each type of breach to its consequence. View AnswerAnswer: