Which TCP/IP sub-protocol operates at the Layer7 of the OSI model?
Answer : C
Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?
Answer : D
Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?
Answer : B
Why is it important to protect East-West traffic within a private cloud?
Answer : A
Which IPsec feature allows device traffic to go directly to the Internet?
Answer : A
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
Answer : D
What are two key characteristics of a Type 1 hypervisor? (Choose two.)
Answer : CD
The customer is responsible only for which type of security when using a SaaS application?
Answer : C
Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?
Answer : C
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
Answer : D
Which endpoint tool or agent can enact behavior-based protection?
Answer : B
Which tool supercharges security operations center (SOC) efficiency with the world's most comprehensive operating platform for enterprise security?
Answer : D
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination
(receiver) IP addresses?
Answer : C
Which core component is used to implement a Zero Trust architecture?
Answer : C
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
Answer : A
Have any questions or issues ? Please dont hesitate to contact us