You discover malware has corrupted the BIOS on your laptop. Which type of malware is this?
Answer : A
Which data security compliance standard is used to protect credit cardholder data wherever it is processed, stored, or transmitted?
Answer : B
What does Palo Alto Networks Traps do first when an endpoint is asked to run an executable?
Answer : D
What is the function of a hashing protocol?
Answer : D
Which two items operate at the network layer in the OSI network model? (Choose two.)
Answer : AB
In which type of cloud computing service does an organization own and control application data, but not the application?
Answer : D
You discover an infected email attachment that contains software code that attacks a known vulnerability in a popular social networking application. This type of software code belongs to which type of malware category?
Answer : D
What is an example of a distance-vector routing protocol?
Answer : C
Which type of firewall monitors traffic streams from beginning to end?
Answer : C
Which option lists the correct sequence of a TCP three-way handshake?
Answer : B
Which two types of SaaS applications are allowed by an IT department? (Choose two.)
Answer : AC
Reference:
https://www.paloaltonetworks.com/cyberpedia/saas-security
Which network method securely connects two sites across a public network?
Answer : A
Review the exhibit and identify the type of vulnerability or attack that is commonly used against this technology.
Answer : D
When accessing an intranet website, a certificate error is received. What can be done to move past the certificate error and ensure that the error is not received the next time the website is accessed?
Answer : A
Assume that it is your responsibility to secure the software functioning at all layers in the exhibit.
Which cloud service model type is represented?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us