Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?

A.

endpoint antivirus software

B.

strong endpoint passwords

C.

endpoint disk encryption

D.

endpoint NIC ACLs

Which type of malware takes advantage of a vulnerability on an endpoint or server?

A.

technique

B.

patch

C.

vulnerability

D.

exploit

How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?

A.

It creates an encrypted connection to the company's data center.

B.

It performs SSL decryption to give visibility into user traffic.

C.

II prevents sensitive data from leaving the network.

D.

II automates the ingestion and aggregation of indicators.

Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?

A.

Session, Transport, Network

B.

Application, Presentation, and Session

C.

Physical, Data Link, Network

D.

Data Link, Session, Transport

In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?

A.

the network is large

B.

the network is small

C.

the network has low bandwidth requirements

D.

the network needs backup routes

Which core component is used to implement a Zero Trust architecture?

A.

VPN Concentrator

B.

Content Identification

C.

Segmentation Platform

D.

Web Application Zone

Which option would be an example of PII that you need to prevent from leaving your enterprise network?

A.

Credit card number

B.

Trade secret

C.

National security information

D.

A symmetric encryption key