New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which security tool provides policy enforcement for mobile users and remote networks?

A.

Service connection

B.

Prisma Access

C.

Prisma Cloud

D.

Digital experience management

Which statement describes the process of application allow listing?

A.

It allows only trusted files, applications, and processes to run.

B.

It creates a set of specific applications that do not run on the system.

C.

It encrypts application data to protect the system from external threats.

D.

It allows safe use of applications by scanning files for malware.

Which of the following is a CI/CD platform?

A.

Github

B.

Jira

C.

Atom.io

D.

Jenkins

In a traditional data center what is one result of sequential traffic analysis?

A.

simplifies security policy management

B.

reduces network latency

C.

causes security policies to be complex

D.

improves security policy application ID enforcement

Which characteristic of advanced malware makes it difficult to detect?

A.

Data decompression

B.

Registered certificates

C.

Morphing code

D.

Low traffic volumes

Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?

A.

North-South traffic

B.

Intrazone traffic

C.

East-West traffic

D.

Interzone traffic

What are two limitations of signature-based anti-malware software? (Choose two.)

A.

It is unable to detect polymorphic malware.

B.

It requires samples lo be buffered

C.

It uses a static file for comparing potential threats.

D.

It only uses packet header information.

Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?

A.

Group policy

B.

Stateless

C.

Stateful

D.

Static packet-filter

During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?

A.

Frame

B.

Segment

C.

Packet

D.

Data

Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?

A.

an intranet-accessed contractor’s system that was compromised

B.

exploitation of an unpatched security vulnerability

C.

access by using a third-party vendor’s password

D.

a phishing scheme that captured a database administrator’s password