Answers
Which type of traffic flows inside a data center?
A. north-south
B. east-west
C. up-down
D. egress traffic - Answer-B. east-west
What is the name of the device used to secure a network's perimeter?
A. switch
B. hub
C. modem
D. firewall - Answer-D. firewall
A Zero Trust network security model is based on which security principle?
A. due diligence
B. least privilege
C. non-repudiation
D. negative control - Answer-D. negative control
What does Zero Trust mean?
A. Systems never trust the information they get from other systems.
B. Systems don't trust each other implicitly.
C. Systems don't trust each other explicitly.
D. Systems only trust each other within the same data center. - Answer-B. Systems
don't trust each other implicitly.
In a full Zero Trust architecture, can two devices communicate except through a security
checkpoint?
A. Yes, but only if they are in the same trust zone.
B. Yes, but only if the client's trust zone level is higher than the server's.
C. No, unless they belong to the same application.
D. No, we need to secure all traffic. - Answer-D. No, we need to secure all traffic.
Which component of a security operating platform can identify a trojan horse that does
not use the network?
A. network security
B. cloud Security
C. Advanced Endpoint Protection
D. SaaS logging service - Answer-C. Advanced Endpoint Protection
, The Logging Service stores data on the cloud in an instance that your organization does
not control and thus provides protection from what?
A. trojan horses
B. viruses
C. worms
D. insider threat - Answer-D. insider threat
Which Palo Alto Networks product suite is used to secure the data center?
A. Strata
B. Prisma
C. Cortex
D. WildFire - Answer-A. Strata
Which Palo Alto Networks product suite is used to secure remote access and cloud
native technologies?
A. Strata
B. Prisma
C. Cortex
D. WildFire - Answer-B. Prisma
Business intelligence (BI) software consists of tools and techniques used to surface
large amounts of raw unstructured data to perform a variety of tasks, including data
mining, event processing, and predictive analytics
True or False - Answer-True.
The process in which end users find personal technology and apps that are more
powerful or capable, more convenient, less expensive, quicker to install, and easier to
use than enterprise IT solutions is known as consumerization.
True or False - Answer-True
Which action is associated with Web 1.0?
A. checking CNN's website for news
B. posting on Facebook
C. adding information to Wikipedia
D. asking Apple's Siri a question - Answer-A. checking CNN's website for news
4Which action is associated with Web 3.0?
A. Checking CNN's website for news
B. posting on Facebook
C. adding information to Wikipedia
D. asking Apple's Siri a question - Answer-D. asking Apple's Siri a question
Gmail is associated with which cloud computing model?
A. SaaS
B. PaaS