From which resource can a Palo Alto Networks firewall get URL category information for URLs whose categories cannot be found on the firewall?
A. App-ID database
B. PDF file
C. PAN-DB database
D. WildFire
正解:C
質問 2:
Which type of security device uses a single-pass, parallel processor hardware architecture to accelerate content inspection?
A. PoS-based firewall
B. next-generation firewall
C. unified threat management
D. stateless firewalls
正解:B
質問 3:
Match each type of breach to its consequence.
正解:
質問 4:
Which type of adversary would execute a website defacement attack to promote a political agenda?
A. gray hat hacker
B. script kiddie
C. state sponsored hacker
D. hacktivist
正解:D
質問 5:
You discover an infected email attachment that contains software code that attacks a known vulnerability in a popular social networking application. This type of software code belongs to which type of malware category?
A. social engineering
B. virus
C. exploit
D. pharming
正解:C
質問 6:
What method can be used to guarantee that a document originates from you and no one else?
A. symmetric encryption, encrypting the document with the secret key and making the same secret key available to others
B. public key encryption, encrypting the document with the private key and making the private key available to others
C. public key encryption, encrypting the document with the private key and making the public key available to others
D. symmetric encryption, encrypting the document with the secret key and making a different secret key available to others
正解:C
質問 7:
Which security component should be used to prevent a malware attack delivered by USB drive?
A. password security
B. firewall security
C. endpoint security
D. physical security
正解:C
解説: (Pass4Test メンバーにのみ表示されます)