Which type of adversary would commit cybercrimes with the authorization of their country's government?
A. state-sponsored
B. hacktivist
C. gray hat
D. white hat
What is the primary purpose of using encryption as part of your network data security architecture?
A. authorization
B. confidentiality
C. integrity
D. authentication
Which data security compliance standard is used to protect card holder data wherever it is processed, stored, or transmitted?
A. Property Card Industry
B. Payment Card Industry
C. Personal Card Industry
D. Payment Club Industry
What does Palo Alto Networks Traps do first when an endpoint is asked to run an executable?
A. send the executable to WildFire
B. run a static analysis
C. run a dynamic analysis
D. check its execution policy
Which option lists the correct sequence of a TCP three-way handshake?
A. SYN, ACK, SYN
B. SYN, SYN+ACK, ACK
C. SYN, ACK, FIN
D. SYN, SYN+ACK, FIN
Which network method securely connects two sites across a public network?
A. VPN
B. VLAN
C. switch
D. router
Which two reconnaissance tools might an attacker use to scan for vulnerable network services and settings? (Choose two.)
A. bandwidth analyzer
B. intrusion detection
C. port scanner
D. password cracker
Which option describes a characteristic of a next-generation firewall but not a UTM device?
A. Content inspection engines operate in individual silos.
B. Content inspection engines use tightly integrated operation.
C. Content inspection engines process traffic serially, not in parallel.
D. Content inspection engines run on the same hardware and memory resources.
Palo Alto Networks Traps is natively integrated with which Palo Alto Networks offering to protect against unknown exploits and malware threats?
A. MineMeld
B. WildFire
C. Content-ID
D. AutoFocus
Which type of SaaS application is allowed and provided by an IT department?
A. tolerated
B. certified
C. sanctioned
D. unsanctioned