Which type of adversary would commit cybercrimes with the authorization of their country's government?
A. state-sponsored
B. hacktivist
C. gray hat
D. white hat
From which resource can a Palo Alto Networks firewall get URL category information for URLs whose categories cannot be found on the firewall?
A. App-ID database
B. WildFire
C. PDF file
D. PAN-DB database
You discover malware has corrupted the BIOS on your laptop. Which type of malware is this?
A. bootkit
B. exploit
C. rootkit
D. vulnerability
What does Palo Alto Networks Traps do first when an endpoint is asked to run an executable?
A. send the executable to WildFire
B. run a static analysis
C. run a dynamic analysis
D. check its execution policy
Which two items operate at the network layer in the OSI network model? (Choose two.)
A. IP address
B. router
C. switch
D. MAC address
Which type of firewall monitors traffic streams from beginning to end?
A. circuit-level gateway
B. stateless
C. stateful
D. packet filter
An attacker emails a malicious URL links to 50,000 email addresses. The email states that users can click the link to view the latest celebrity news, but the link also secretly infects the user's laptop. This scenario describes which type of attack?
A. whailing
B. phishing
C. drive-by download
D. pharming
Palo Alto Networks App-ID uses information from which source to help identify an application in network traffic?
A. PAN-DB URL database
B. traffic behavioral analysis
C. source port in packet header
D. destination IP address in packet header