No student devices needed. Know more
50 questions
In which cloud computing service model does a provider’s applications run on a cloud infrastructure and the consumer does not manage or control the underlying infrastructure?
platform as a service (PaaS)
infrastructure as a service (IaaS)
software as a service (SaaS)
public cloud
Business intelligence (BI) software consists of tools and techniques used to surface large amounts of raw unstructured data to perform a variety of tasks including data mining, event processing, and predictive analytics.
True
False
The process in which end users find personal technology and apps that are more powerful or capable, more convenient, less expensive, quicker to install, and easier to use than enterprise IT solutions is known as consumerization.
True
False
An organization can be compliant with all applicable security and privacy regulations for its industry, yet still not be secure.
True
False
Most cyberattacks today are perpetrated by internal threat actors such as malicious employees engaging in corporate espionage.
True
False
The Cyber-Attack Lifecycle is a five-step process that an attacker goes through to attack a network.
True
False
An attacker needs to succeed in executing only one step of the Cyber-Attack Lifecycle to infiltrate a network, whereas a defender must “be right every time” and break every step of the chain to prevent an attack.
True
False
Which technique is not used to break the command-andcontrol (C&C) phase of the Cyber-Attack Lifecycle?
blocking outbound traffic to known malicious sites and IP addresses
DNS sinkholing and DNS poisoning
vulnerability and patch management
all of the above
The key to breaking the Cyber-Attack Lifecycle during the Installation phase is to implement network segmentation, a Zero Trust model, and granular control of applications to limit or restrict an attacker’s lateral movement within the network.
True
False
Network firewalls cannot completely protect hosts from zeroday exploits.
True
False
Which option describes malicious software or code that typically takes control of, collects information from, or damages an infected endpoint?
exploit
malware
vulnerability
none of the above
Which option is an important characteristic or capability of advanced malware?
distributed, fault-tolerant architecture
multi-functionality
hiding techniques such as polymorphism, metamorphism, and obfuscation
all of the above
A vulnerability is a small piece of software code, part of a malformed data file, or a sequence (string) of commands created by an attacker to cause unintended or unanticipated behavior in a system or software.
True
False
New exploits can be crafted from any number of more than a thousand core exploit techniques.
True
False
Wired Equivalent Privacy (WEP) is an effective protocol for securing wireless networks.
True
False
Which option is an example of a static routing protocol?
Open Shortest Path First (OSPF)
Border Gateway Protocol (BGP)
Routing Information Protocol (RIP)
split horizon
The U.S. law that establishes national standards to protect individuals’ medical records and other health information is known as the Health Insurance Portability and Accountability Act (HIPAA).
True
False
The internet is an example of a wide-area network (WAN).
True
False
Which option is an example of a logical address?
IP address
hardware address
MAC address
burned-in address
The OSI model consists of how many layers?
four
six
seven
nine
Zero-day exploits target unknown vulnerabilities in operating system and application software on a host machine.
True
False
The Data Link layer of the OSI model is further divided into
these two sublayers: media access control (MAC) and Logical Link Control (LLC).
True
False
A Zero Trust network security model is based on which security principle?
due diligence
least privilege
non-repudiation
negative control
Intra-VM traffic is also known as which type of traffic?
north-south
unknown
east-west
untrusted
What does the first phase of implementing security in virtualized data centers consist of?
consolidating servers across trust levels
consolidating servers within trust levels
selectively virtualizing network security functions
implementing a dynamic computing fabric
A dynamic packet filtering firewall inspects each individual packet during a session to determine if the traffic should be allowed, blocked, or dropped by the firewall.
True
False
MineMeld an open-source application, available directly on GitHub, that streamlines the aggregation, enforcement, and sharing of threat intelligence.
True
False
Which VPN technology is currently considered the preferred method for securely connecting a remote endpoint device back to an enterprise network?
point-to-point tunneling protocol (PPTP)
secure socket tunneling protocol (SSTP)
Secure Sockets Layer (SSL)
Internet Protocol Security (IPsec)
Which is NOT a characteristic of Unified Threat Management (UTM)?
It combines security functions such as firewalls, intrusion detection systems (IDS), anti-malware, and data loss prevention (DLP) in a single appliance.
enabling all of the security functions in a UTM device can have a significant performance impact.
It fully integrates all the security functions installed on the device.
It can be a convenient solution for small networks.
Signature-based anti-malware software is considered a proactive security countermeasure.
True
False
The Domain Name System (DNS) is a distributed, hierarchical internet database that maps FQDNs to IP addresses.
True
False
A one-way hash is a mathematical function that creates a unique representation of a larger set of data in a manner that is easy to compute in one direction, but not in the reverse direction.
True
False
A router sends data packets to destination networks along a network path using logical addresses.
True
False
An IPv4 address consists of four 8-bit octets.
True
False
Which option is not a defining characteristic of an NGFW?
low latency packet processing with minimal throughput loss
adherence to strict port and protocol enforcement for allow or block decisions
integrated security tools
bidirectional full-stack analysis of packets
Which option is not a core technique for identifying applications in Palo Alto Networks NGFWs?
packet headers
application signatures
protocol decoding
behavioral analysis
Panorama does not integrate with which option?
WildFire
Splunk
Palo Alto Networks NGFWs
traditional port-based firewalls
The key to Traps is blocking core exploit and malware techniques, not the individual attacks.
True
False
Aperture is deployed as a standalone inline service between the organization’s traditional perimeter-based firewalls and requires a software agent to be installed on mobile devices.
True
False
Aperture protects data in hosted files and application entries.
True
False
Subnetting is a technique used to divide a large network into smaller, multiple subnetworks by segmenting an IPv4 address into a network and host portion.
True
False
AutoFocus is an optional module that can be installed on NGFWs.
True
False
WildFire operates on which concept?
file-based scanning against a signature database
IPS and SIEM tool correlation
cloud-based reputation service
virtualized sandbox
WildFire prevents known and unknown malware threats.
True
False
WildFire performs deep packet inspection of malicious outbound communications to disrupt C&C activity.
True
False
Container-based endpoint protection wraps a protective virtual barrier around vulnerable processes while they’re running.
True
False
A storage area network (SAN) uses hybrid-based storage.
True
False
Active Directory is a network directory service developed by Microsoft for Windows networks.
True
False
ITIL is a set of IT service management best practices.
True
False
Evident provides continuous monitoring of public clouds and helps organizations achieve a continuous state of compliance in their public cloud workloads.
True
False
Explore all questions with a free account