لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
You discover an infected email attachment that contains software code that attacks a known vulnerability in a popular social networking application. This type of software code belongs to which type of malware category?
A. ocial engineering
B. irus
C. harming
D. xploit
عرض الإجابة
اجابة صحيحة: D
السؤال #2
Which type of adversary would execute a website defacement attack to promote a political agenda?
A. script kiddie
B. hacktivist
C. gray hat hacker
D. state sponsored hacker
عرض الإجابة
اجابة صحيحة: B
السؤال #3
A firewall located on an organization’s network perimeter can be used to protect against which type of attack?
A. malicious SaaS application file accessed from an unmanaged mobile phone
B. ansomware installed from an infected USB drive
C. alware installed on the laptop by a disgruntled employee
D. malicious PDF file located on an internet website
عرض الإجابة
اجابة صحيحة: D
السؤال #4
Which type of cloud computing service provides access to email and word processing applications running in a cloud infrastructure?
A. software as a service
B. computing as a service
C. platform as a service
D. infrastructure as a service
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Which Palo Alto Networks product or feature includes machine learning to enhance security?
A. anorama
B. ineMeld
C. agnifier
D. ser-ID
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Which mobile device management feature prevents jailbreaking or rooting?
A. oftware distribution
B. alware protection
C. olicy enforcement
D. ata loss prevention
عرض الإجابة
اجابة صحيحة: C
السؤال #7
Which two remote access methods are secure because they encrypt traffic? (Choose two.)
A. IPsec-AH
B. SSH
C. VPN
D. Telnet
E. rlogin
عرض الإجابة
اجابة صحيحة: BC
السؤال #8
When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk?
A. imiting
B. ssuming
C. ransferring
D. voiding
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Match each option with the term it describes.Select and Place: Exhibit A:Exhibit B:
A. he answer is Exhibit B
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Which protocol converts voice into a digital signal?
A. VO
B. oIP
C. NMP
D. GMP
عرض الإجابة
اجابة صحيحة: B
السؤال #11
From which resource can a Palo Alto Networks firewall get URL category information for URLs whose categories cannot be found on the firewall?
A. pp-ID database
B. ildFire
C. DF file
D. AN-DB database
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Which type of security device uses a single-pass, parallel processor hardware architecture to accelerate content inspection?
A. nified threat management
B. tateless firewalls
C. ext-generation firewall
D. oS-based firewall
عرض الإجابة
اجابة صحيحة: C
السؤال #13
Which type of attack floods a target with ICMP requests?
A. oute table poisoning
B. econnaissance
C. P spoofing
D. enial-of-service
عرض الإجابة
اجابة صحيحة: D
السؤال #14
What is a component of a public key infrastructure?
A. ey Distribution Center
B. DC ticket
C. SH key
D. ertificate authority
عرض الإجابة
اجابة صحيحة: D
السؤال #15
Which type of adversary would commit cybercrimes with the authorization of their country’s government?
A. tate-sponsored
B. acktivist
C. ray hat
D. hite hat
عرض الإجابة
اجابة صحيحة: A
السؤال #16
What is an example of a distance-vector routing protocol?
A. SPF
B. GP
C. IP
D. GRP
عرض الإجابة
اجابة صحيحة: C
السؤال #17
What is an effective defense against a denial-of-service attack?
A. deploy a firewall to reject suspect network packets
B. flood the DoS source with ICMP echo requests to reduce attack output
C. contact the upstream ISP and disconnect affected network interfaces
D. configure additional network interfaces for legitimate network traffic
عرض الإجابة
اجابة صحيحة: C
السؤال #18
Match the tool to its capability.Select and Place: Exhibit A:Exhibit B:
A. he answer is Exhibit B
عرض الإجابة
اجابة صحيحة: A
السؤال #19
Match each type of breach to its consequence.Select and Place: Exhibit A:Exhibit B:
A. he answer is Exhibit B
عرض الإجابة
اجابة صحيحة: A
السؤال #20
Which option describes a characteristic of a distributed denial-of- service attack?
A. ses multiple types of malware to corrupt system services
B. ses a single remote host to delete data from multiple target servers
C. ses a single remote host to flood a target network with traffic
D. ses a botnet to flood traffic to a target network
عرض الإجابة
اجابة صحيحة: D
السؤال #21
To which type of organization does the PCI DSS apply?
A. ny organization that accepts, transmits, or stores any cardholder data
B. rganizations that only accept cardholder data regardless of size or number of transactions
C. nly organization larger than 100 employees that accept, transmit, or store any cardholder data
D. rganization that only transmit data regardless of size or number of transactions
عرض الإجابة
اجابة صحيحة: A
السؤال #22
What are two methods to securely transmit personally identifiable information? (Choose two.)
A. uthorization
B. onfidentiality
C. ntegrity
D. uthentication
عرض الإجابة
اجابة صحيحة: CD
السؤال #23
Which network security architecture feature is designed to purposely expose some of an organization"?s services to untrusted networks?
A. network zone
B. security zone
C. demilitarized zone
D. military zone
عرض الإجابة
اجابة صحيحة: C
السؤال #24
What does a hypervisor enable?
A. igh-speed searching of already aggregated security log files
B. igh-speed aggregation and viewing of security log files
C. ultiple physical machines to be configured into a high-performance cluster
D. ultiple guest operating systems to run on a single physical machine
عرض الإجابة
اجابة صحيحة: D
السؤال #25
Match the Palo Alto Networks Wild Fire analysis verdict with its definition.Select and Place: Exhibit A:Exhibit B:
A. he answer is Exhibit B
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: