and Correct Answers
Essentially an intelligent hub that uses physical addresses to forward data packets to
devices on a network. Unlike a hub, this is designed to forward data packets only to the
port that corresponds to the destination device. - Answer-switch
Also, a switch can be used to implement virtual LANs (VLANs), which logically
segregate what? - Answer-logically segregate a network and limit broadcast domains
and collision domains.
T/F - a robust data loss prevention (DLP) solution can detect data patterns even if the
data is encrypted - Answer-True
DS/IPS system uses a database of known vulnerabilities and attack profiles to identify
intrusion attempts - Answer-knowledge-based
next-generation product replaces UTM appliances to reduce traffic inspection latency -
Answer-
PAN-OS Next-Generation Firewall configuration templates are based on security best
practice recommendations instead of extensive how-to documentation - Answer-Iron-
skillet
record specifies authoritative information about a DNS zone such as primary name
server, email address of the domain administrator, and domain serial number - Answer-
start of authority (SOA)
PANW firewalls are built on this type of architecture - Answer-single pass
32 bit logical address is the most widely deployed version of IP - Answer-IPv4
Which TCP/IP sub-protocol operates at the Layer7 of the OSI model? - Answer-SNMP
Which WildFire analysis detonates an unknown submission in a custom virtual
environment to find effects and behavior? - Answer-Dynamic
Which type of Wi-Fi attack depends on the victim initiating the connection? - Answer-
Jasager
, Term for data packets that move in and out of environment from the host network or
corresponding traditional data center - Answer-north-south traffic
Responsible for security automation to help ensure consistency through machine driven
responses to security issues? - Answer-SecOps
Which of the following is the correct order for the cyber-attack lifecycle? - Answer-
Reconnaissance, Weaponization, Delivery, Exploitation, Installation, C2
IAM security ensures _________ access to cloud resources and infrastructure. -
Answer-least-privileged
ML-Powered NGFW (PA-Series): Winning against Fortinet with the new Miercom
Report - Answer-User Entity Behavior Analytics
Access Management secures and manages the relationships between users and
resources (T/F) - Answer-TRUE
Machine Identity decouples workload ______ from IP addresses - Answer-Identity
On an endpoint, which method should you use to secure applications against exploits? -
Answer-endpoint-based firewall
Which non-profit maintains the common vulnerability exposure catalog that is available
on their public website? - Answer-MITRE
Which Palo tool enables a proactive, prevention-based approach to network automation
that accelerates security analysis? - Answer-cortex xdr
Palo Alto Networks firewalls are built on which type of architecture? - Answer-single
pass
Bytes in an IPv4 address - Answer-32 bits
Bytes in an IPv6 address - Answer-128 bits
malware type can change code and signature patterns with each iteration - Answer-
metamorphic virus
3 deployment mode options for Panorama - Answer-Panorama mode, Management
only mode, Log collected mode
Mobile device management (MDM) - Answer-software provides endpoint security for
mobile devices such as smartphones and tablets