Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?A . North-South trafficB . Intrazone trafficC . East-West trafficD . Interzone trafficView AnswerAnswer: A Explanation: North-South traffic refers to the data packets that move between the...
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?A . FrameB . SegmentC . PacketD . DataView AnswerAnswer: C Explanation: The IP stack adds source (sender) and destination (receiver)...
How does adopting a serverless model impact application development?
How does adopting a serverless model impact application development?A . costs more to develop application code because it uses more compute resourcesB . slows down the deployment of application code, but it improves the quality of code developmentC . reduces the operational overhead necessary to deploy application codeD . prevents...
Which activities do local organization security policies cover for a SaaS application?
Which activities do local organization security policies cover for a SaaS application?A . how the data is backed up in one or more locationsB . how the application can be usedC . how the application processes the dataD . how the application can transit the InternetView AnswerAnswer: B Explanation: Local...
Which core component is used to implement a Zero Trust architecture?
Which core component is used to implement a Zero Trust architecture?A . VPN ConcentratorB . Content IdentificationC . Segmentation PlatformD . Web Application ZoneView AnswerAnswer: C Explanation: "Remember that a trust zone is not intended to be a “pocket of trust” where systems (and therefore threats) within the zone can...
Which technique changes protocols at random during a session?
Which technique changes protocols at random during a session?A . use of non-standard portsB . port hoppingC . hiding within SSL encryptionD . tunneling within commonly used servicesView AnswerAnswer: B Explanation: Port hopping is a technique that changes protocols at random during a session to evade detection and analysis by...
Order the OSI model with Layer7 at the top and Layer1 at the bottom.
Order the OSI model with Layer7 at the top and Layer1 at the bottom.A . Layer 1B . Layer 2C . Layer 3D . Layer 7View AnswerAnswer: AD
Which subnet does the host 192.168.19.36/27 belong?
Which subnet does the host 192.168.19.36/27 belong?A . 192.168.19.0B . 192.168.19.16C . 192.168.19.64D . 192.168.19.32View AnswerAnswer: B Explanation: To find the subnet that the host 192.168.19.36/27 belongs to, we need to convert the IP address and the subnet mask to binary form and perform a logical AND operation. The /27...
Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?
Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?A . DNS SecurityB . URL FilteringC . WildFireD . Threat PreventionView AnswerAnswer: C Explanation: "The WildFire cloud-based malware analysis environment is a cyber threat prevention...
Which option is a Prisma Access security service?
Which option is a Prisma Access security service?A . Compute SecurityB . Firewall as a Service (FWaaS)C . Virtual Private Networks (VPNs)D . Software-defined wide-area networks (SD-WANs)View AnswerAnswer: B Explanation: Prisma Access provides firewall as a service (FWaaS) that protects branch offices from threats while also providing the security services...