Which of the following is a Routed Protocol?
Which of the following is a Routed Protocol?A . Routing Information Protocol (RIP) B. Transmission Control Protocol (TCP) C. Internet Protocol (IP) D. Domain Name Service (DNS)View AnswerAnswer: A
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?A . Use of non-standard ports B. Hiding within SSL encryption C. Port hopping D. Tunneling within commonly used servicesView AnswerAnswer: D
On an endpoint, which method should you use to secure applications against exploits?
On an endpoint, which method should you use to secure applications against exploits?A . endpoint-based firewall B. strong user passwords C. full-disk encryption D. software patchesView AnswerAnswer: D Explanation: New software vulnerabilities and exploits are discovered all the time and thus diligent software patch management is required by system and...
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?A . cybercriminals B. state-affiliated groups C. hacktivists D. cyberterroristsView AnswerAnswer: D
Which option is an example of a North-South traffic flow?
Which option is an example of a North-South traffic flow?A . Lateral movement within a cloud or data center B. An internal three-tier application C. Client-server interactions that cross the edge perimeter D. Traffic between an internal server and internal userView AnswerAnswer: C Explanation: North-south refers to data packets that...
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)A . Birthplace B. Login 10 C. Profession D. NameView AnswerAnswer: A,D
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?A . operating system patches B. full-disk encryption C. periodic data backups D. endpoint-based firewallView AnswerAnswer: B
What deployment options do you have available?
You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads. What deployment options do you have available? (Choose two.)A . PA-Series B. VM-Series C. Panorama D. CN-SeriesView AnswerAnswer: A,B