Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
A. It cannot identify command-and-control traffic.
B. It cannot monitor all potential network ports.
C. It assumes that all internal devices are untrusted.
D. It assumes that every internal endpoint can be trusted.
Which type of attack floods a target with ICMP requests?
A. route table poisoning
B. reconnaissance
C. IP spoofing
D. denial-of-service
Which two items operate at the network layer in the OSI network model? (Choose two.)
A. IP address
B. router
C. switch
D. MAC address
What is an example of a distance-vector routing protocol?
A. OSPF
B. BGP
C. RIP D. IGRP
Which type of firewall monitors traffic streams from beginning to end?
A. circuit-level gateway
B. stateless
C. stateful
D. packet filter
Company policy allows employees to access the internet. While searching for office supplies on the internet, a corporate user mistypes a URL, connects to a malicious website, and unknowingly downloads malware.
Which action should have been taken to prevent the malware download but still allow user access to the internet?
A. deploy a firewall with content filtering capabilities on the corporate perimeter
B. allow only encrypted HTTPS access to the internet
C. configure digital certificates for all users to authenticate internet downloads
D. permit web connections only to TCP port 443
Which type of cloud computing service provides access to email and word processing applications running in a cloud infrastructure?
A. software as a service
B. computing as a service
C. platform as a service
D. infrastructure as a service
What is the result of deploying virtualization in your data center?
A. reduced security threat
B. reduced operational costs
C. increased hardware capital costs
D. increased host provisioning
Which type of adversary would execute a website defacement attack to promote a political agenda?
A. script kiddie
B. hacktivist
C. gray hat hacker
D. state sponsored hacker
Palo Alto Networks Traps is natively integrated with which Palo Alto Networks offering to protect against unknown exploits and malware threats?
A. MineMeld
B. WildFire
C. Content-ID
D. AutoFocus