Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.A . It cannot identify command-and-control traffic.B . It cannot monitor all potential network ports.C . It assumes that all internal devices are untrusted.D . It assumes that every internal endpoint can be trusted.View AnswerAnswer: D

July 17, 2019 No Comments READ MORE +

A firewall located on an organization’s network perimeter can be used to protect against which type of attack?

A firewall located on an organization’s network perimeter can be used to protect against which type of attack?A . a malicious SaaS application file accessed from an unmanaged mobile phoneB . ransomware installed from an infected USB driveC . malware installed on the laptop by a disgruntled employeeD . a...

July 14, 2019 No Comments READ MORE +

When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk?

When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk?A . limitingB . assumingC . trasnferringD . avoidingView AnswerAnswer: A

July 7, 2019 No Comments READ MORE +

Which mobile device management feature prevents jailbreaking or rooting?

Which mobile device management feature prevents jailbreaking or rooting?A . software distributionB . malware protectionC . policy enforcementD . data loss preventionView AnswerAnswer: C

July 6, 2019 No Comments READ MORE +

Which security component should be used to prevent a malware attack delivered by USB drive?

Which security component should be used to prevent a malware attack delivered by USB drive?A . endpoint securityB . password securityC . physical securityD . firewall securityView AnswerAnswer: C

July 5, 2019 No Comments READ MORE +

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans and rootkits?

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans and rootkits?A . AutoFocusB . TrapsC . ExpeditionD . App-IDView AnswerAnswer: B

July 3, 2019 No Comments READ MORE +

Match the tool to its capability

DRAG DROP Match the tool to its capability. View AnswerAnswer:

July 1, 2019 No Comments READ MORE +

Which device would an Evil Twin attack use to lure the victim to connect to the attack surface network?

Which device would an Evil Twin attack use to lure the victim to connect to the attack surface network?A . switchB . firewallC . routerD . access pointView AnswerAnswer: D

July 1, 2019 No Comments READ MORE +

Which type of adversary would commit cybercrimes with the authorization of their country’s government?

Which type of adversary would commit cybercrimes with the authorization of their country’s government?A . state-sponsoredB . hacktivistC . gray hatD . white hatView AnswerAnswer: A

June 27, 2019 No Comments READ MORE +

Match each type of breach to its consequence

DRAG DROP Match each type of breach to its consequence. View AnswerAnswer:

June 26, 2019 No Comments READ MORE +