Networkers home Palo alto v10( PCNSE)

1. Used to restrict the internet activity of users on a network and match a web address (uniform resource locator, or URL) against a database of websites
Web content filters
Firewalls
IDS
IPS
2. Attempt to classify websites based on broad categories that are either allowed or blocked for various groups of users on the network.
Web content filters
Firewalls
IDS
IPS
3. An example of this is a marketing and human resources departments may have access to social media sites such as Facebook and LinkedIn for legitimate online marketing and recruiting activities, while other users are blocked.
IPS
IDs
Web content filters
Firewalls
4. Provide real-time monitoring of network traffic and perform deep-packet inspection and analysis of network activity and data.
Uniform Resource Locator (URL)
Traditional network security technologies
Packet filtering and Stateful Packet Inspection (SPI)
Intrusion detection systems (IDS) and Intrusion Prevention Systems (IPS)
5. The primary difference between IDS and IPS is:
IDS is considered to be an active system, whereas IPS is an passive system.
IDS is considered to be a passive system, whereas IPS is an active system.
6. Firewalls, intrusion detection systems, Intrusion Prevention Systems (IDS/IPS) and web content filters are all considered:
Non-traditional network security technologies
Firewalls
Traditional network security technologies
7. Packet filtering and Stateful Packet Inspection (SPI) are two types of:
Firewalls
VPNs
Protocols
Anti-spam
8. Performs all of the same functions as an IDS but also automatically blocks or drops suspicious, pattern-matching activity on the network in real-time.
Intrusion Prevention Systems (IPS)
IDS (Intrusion Detection System)
9. A unique reference (or address) to an internet resource, such as a webpage.
Universal Resource Locator (URL)
Uniform Resource Locator (URL)
Unified Threat Management (UTM)
Security Information & Event Management (SIEM)
10. Items typically are analyzed by a next-generation firewall. Check all that apply.
Uniform Resource Locators
User-ID
Content-ID
App-ID
11. Can successfully improve a company's security posture by simplifying their security product portfolio.
Secure Socket Layer (SSL)
Data Loss Prevention (DLP)
L2TP
Unified Threat Management (UTM)
12. Which term refers to stripping header information as a PDU is passed from one layer to a higher layer?
Encapsulation
Packetization
Deencapsulation
PDU stripping
13. The OSI Application Layer manages encryption and formatting.
True
False
14. Which OSI layer handles flow control, data segmentation, and reliability?
Application
Session
Data link
Transport
15. Which of the following problems can occur at the Physical layer?
NIC driver problems
Signal errors caused by noise
Incorrect IP addresses
16. Which OSI layer is responsible for setting up, maintaining, and ending ongoing information exchanges across a network?
2
6
5
3
17. Which OSI layer determines the route a packet takes from sender to receiver?
1
4
7
3
18. At which Data Link sublayer does the physical address reside?
Network Access Control (NAC)
Data Access Control (DAC)
Media Access Control (MAC)
Logical Link Control (LLC)
19. At which OSI layer does the PDU contain sequence and acknowledgement numbers?
6
4
Application
Data link
20.HTTP interacts with which OSI layer?
Session
Application
Physical
Data link
21. Which layer of the OSI model does Project 802 divide into two sublayers?
Session
Physical
Data link
Network
22. True or False. A vulnerability is a small piece of software code, part of a malformed data file, or a sequence (string) of commands created by an attacker to cause unintended or unanticipated behavior in a system or software.
True
False
23. Some important characteristics and capabilities of advanced malware include:
Multi-functionality
Hiding techniques such as polymorphism and metamorphism
Distributed, fault-tolerant architecture
Hiding techniques such as obfuscation
24. True or False. Wired Equivalent Privacy (WEP) is the most effective protocol for securing wireless networks.
False
True
25. What is an easy way to make your WiFi security stronger and make it more difficult for hackers to discover your wireless network?
Change the Initialization Vector (IV)
Change the Service Set Identifier (SSID)
Change the Extensible Authentication Protocol (EAP)
Change the Access Point (AP) Password
26. What type of attack is intended to rapidly cause damage to the victim's network and system infrastructure, as well as their business and reputation?
Man in the Middle Attack (MITM)
Social Engineering Attack
Reconnaissance Attack
Distributed Denial of Service (DDoS)
27. Malicious software or code that typically damages, takes control of, or collects information from an infected endpoint is known as:
Vulnerability
Exploit
Anti-virus
Malware
28. What type of malware typically targets a computer network by replicating itself in order to spread rapidly?
Logic bomb
Virus
Backdoor
Worm
29. What type of malware allows an attacker to bypass authentication to gain access to a compromised system?
Virus
Backdoor
Anti Anti-virus
Logic bomb
30. What type of malware is triggered by a specific condition, such as a specific date or a particular user account being disabled?
Logic bomb
Backdoor
Worm
Trojan horse
31. True or False. Most Botnets are designed to withstand the loss of a command and control (CnC) server, meaning that the entire Botnet infrastructure must be disabled almost simultaneously.
True
False
32. When you set up a wireless home network, you give it a name to distinguish it from other networks in your neighborhood. The technical term for this network name is:
SSDI
Rainbow table
SSID
Wired Equivalent Privacy (WEP)
33. This protocol was the wireless industry’s first attempt at security. It was intended to provide data confidentiality equivalent to the security of a wired network but had many, well-known weaknesses and wasn’t effective for establishing a secure wireless network. .
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA/WPA2/WPA3)
Extensible Authentication Protocol (EAP)
WPA2-PSK
34. By far the most common, particularly in homes, small businesses, and guest Wi-Fi networks.
Wi-Fi Protected Access (WPA2)
Pre-Shared Key (PSK)
Wired Equivalent Privacy (WEP)
Wi-Fi Protected Access (WPA3)
35. Which IP address type is commonly self-assigned by a DHCP client when no DHCP server is available?
APIPA
NAT
Static
PAT
36. Windows Directory Services allows you to:
Create VPN network connections
Administer user accounts and logon policies
Open and close firewall ports
37. Why would you use a Time Domain Reflectometer?
Identify bottlenecks in the network architecture
Simulate load on a network segment
Identify the location of a break in the network cable
38. CRC, Cyclic Redundancy Check, is used to verify:
Frame Integrity
Least-Cost path
QoS - Quality of Service
UDP handshakes
39. Select the three pillars of security orchestration.
SaaS, IaaS, PaaS
Virtualization, Storage, Cloud
People, Process, Technology
Software, Hardware, Storage
40. WIldFire operates on which concept?
file-based scanning against a signature database
cloud-based reputation service
IPS and SIEM tool correlation
virtualized sandbox
41. T/F? WIldFire prevents known and unknown malware threats.
False
True
42. T/F? WildFIre performs deep packet inspection of malicious outbound communications to disrupt C&C activity.
True
False
0
{"name":"Networkers home Palo alto v10( PCNSE)", "url":"https://www.quiz-maker.com/Q62L2FFDL","txt":"1. Used to restrict the internet activity of users on a network and match a web address (uniform resource locator, or URL) against a database of websites, 2. Attempt to classify websites based on broad categories that are either allowed or blocked for various groups of users on the network., 3. An example of this is a marketing and human resources departments may have access to social media sites such as Facebook and LinkedIn for legitimate online marketing and recruiting activities, while other users are blocked.","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker