AND ANSWERS (GRADED A+)
When is it impossible to secure SaaS data?
When a user uses an unmanaged device to access an unsanctioned SaaS instance.
When a user uses a managed device to access an unsanctioned SaaS instance.
When a user uses an unmanaged device to access a sanctioned SaaS instance.
When a user uses a managed device to access a sanctioned SaaS instance. -
ANSWER-When a user uses an unmanaged device to access an unsanctioned SaaS
instance.
Which group is primarily motivated by money?
hacktivists
cybercriminals
cyberterrorists
state-affiliated groups - ANSWER-Cybercriminals
Which two malware types are self-replicating? (Choose two.)
logic bomb
back door
virus
trojan horse
worm - ANSWER-Virus
Worm
Which type of attack includes an email advertisement for a dry cleaning service?
spamming
phishing
spear phishing
whaling - ANSWER-Spamming
Who is the most likely target of social engineering?
Executive management, because it has the most permissions.
Senior IT engineers, because the attacker hopes to get them to disable the security
infrastructure.
Junior people, because they are easier to stress and probably not as well trained.
,The accounting department, because it can wire money directly to the attacker's
account. - ANSWER-Junior people, because they are easier to stress and probably not
as well trained.
Which two attacks typically use a botnet? (Choose two.)
Ssocial engineering
DoS
DDoS
Sending spam to a lengthy mailing list
Spear phishing - ANSWER-DDoS
Sending spam to a lengthy mailing list.
What is the name of the attack in which the attacker gets the victim to connect to an
access point the attack controls?
Person in the middle
Man in the middle
Access point in the middle
Access point masquerading - ANSWER-Man in the middle
Which Palo Alto Networks product suite is used to manage alerts, obtain additional
information, and orchestrate responses?
Strata
Prisma
Cortex
WildFire - ANSWER-Cortex
On which device do you configure VLANs?
wireless repeater
hub
switch
router - ANSWER-Switch
Which DNS record type do you use to find the IPv4 address of a host?
A
AAAA
PTR
MX - ANSWER-A
Which device is M2M (machine to machine)?
, Internet-connected TV
home alarm that dials the police for response
car GPS
temperature sensor connected to a fire suppression system - ANSWER-Temperature
sensor connected to a fire suppression system.
How many bytes are in an IPv6 address?
4
8
16
32 - ANSWER-16
Which three security functions are integrated with a UTM device? (Choose three.)
cloud access security broker (CASB)
firewall
Remote Browser Isolation (RBI)
Intrusion Detection System (IDS)
anti-spam
DevOps automation - ANSWER-firewall
Intrusion Detection System (IDS)
anti-spam
Which type of malware protection requires in-depth knowledge of applications and how
they communicate?
signature-based
container-based
application allow lists
anomaly detection - ANSWER-Container-based
Which Panorama object is used to manage the security policy?
template
device group
virtual system
Decryption Profile - ANSWER-Device group
Which feature of the NGFW can distinguish between reading Facebook and
commenting?
App-ID
Content-ID
User-ID
Global Protect - ANSWER-App-ID