Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)

A.

decrypt the infected file using base64

B.

alert system administrators

C.

quarantine the infected file

D.

delete the infected file

E.

remove the infected file’s extension

Match the description with the VPN technology.

How can local systems eliminate vulnerabilities?

A.

Patch systems and software effectively and continuously.

B.

Create preventative memory-corruption techniques.

C.

Perform an attack on local systems.

D.

Test and deploy patches on a focused set of systems.

Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?

A.

Statistical-based

B.

Knowledge-based

C.

Behavior-based

D.

Anomaly-based

What is the definition of a zero-day threat?

A.

The amount of time it takes to discover a vulnerability and release a security fix

B.

The period between the discovery of a vulnerability and development and release of a patch

C.

The day a software vendor becomes aware of an exploit and prevents any further hacking

D.

A specific day during which zero threats occurred

Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?

A.

O Multicloud

B.

O 5G -

C.

Micro-segmentation

D.

DevOps

In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?

A.

False-positive

B.

True-negative

C.

False-negative

D.

True-positive

On which security principle does virtualization have positive effects?

A.

integrity

B.

confidentiality

C.

availability

D.

non-repudiation

Which endpoint product from Palo Alto Networks can help with SOC visibility?

A.

STIX

B.

Cortex XDR

C.

WildFire

D.

AutoFocus

In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?

A.

exploitation

B.

actions on the objective

C.

command and control

D.

installation