DRAG DROP
Match the Palo Alto Networks Wild Fire analysis verdict with its definition.
Select and Place:
DRAG DROP
Match the attack definition to the type of security method used to protect against the attack.
Select and Place:
What is a component of a public key infrastructure?
A. Key Distribution Center
B. KDC ticket
C. SSH key
D. certificate authority
Which mobile device management feature prevents jailbreaking or rooting?
A. software distribution
B. malware protection
C. policy enforcement
D. data loss prevention
What is the primary purpose of using encryption as part of your network data security architecture?
A. authorization
B. confidentiality
C. integrity
D. authentication
A firewall located on an organization's network perimeter can be used to protect against which type of attack?
A. a malicious SaaS application file accessed from an unmanaged mobile phone
B. ransomware installed from an infected USB drive
C. malware installed on the laptop by a disgruntled employee
D. a malicious PDF file located on an internet website
Which protocol converts voice into a digital signal?
A. IVO
B. VoIP
C. SNMP
D. IGMP
Which option lists the correct sequence of a TCP three-way handshake?
A. SYN, ACK, SYN
B. SYN, SYN+ACK, ACK
C. SYN, ACK, FIN
D. SYN, SYN+ACK, FIN
Which two types of SaaS applications are allowed by an IT department? (Choose two.)
A. tolerated
B. certified
C. sanctioned
D. unsanctioned
Review the exhibit and identify the type of vulnerability or attack that is commonly used against this technology.
A. phishing
B. denial-of-service
C. code-injection
D. password cracking
Which type of cloud computing deployment makes resources exclusively available to members of a single organization?
A. local
B. private
C. hybrid
D. public
Which two remote access methods are secure because they encrypt traffic? (Choose two.)
A. IPsec-AH
B. SSH
C. VPN
D. Telnet
E. rlogin
Which component of a digital certificate provides authentication of the certificate's issuer?
A. digital signature
B. certificate revocation list
C. issuer's private key
D. certificate's expiration date
On an endpoint, which method should you use to secure applications against exploits?
A. full-disk encryption
B. strong user passwords
C. software patches
D. endpoint-based firewall
Assume that it is your responsibility to secure the software functioning at top five layers in the exhibit.
Which cloud service model type is represented?
A. software as a service
B. platform as a service
C. infrastructure as a service
D. on-premises