Question 1 of 10
Which type of cyberattack sends extremely high volumes of network traffic such as packets, data, or transactions that render the victim’s network unavailable or unusable?
(V) distributed denial-of-service (DDoS)
phishing botnet
denial-of-service (DoS)
spamming botnet
Question 2 of 10
Which tactic, technique, or procedure (TTP) masks application traffic over port 443 (HTTPS)?
hopping ports
using non-standard ports
(V) hiding within SSL encryption
tunneling
Question 3 of 10
Which specific technology is associated with Web 3.0?
instant messaging
(V) blockchain
remote meeting software
social networks
Question 4 of 10
Which type of advanced malware has entire sections of code that serve no purpose other than to change the signature of the malware, thus producing an infinite number of signature hashes for even the smallest of malware programs?
obfuscation
distributed
multi-functional
(V) polymorphism
Question 5 of 10
Which core component of Cortex combines security orchestration, incident management, and interactive investigation to serve security teams across the incident lifecycle?
Cortex XDR
(V) Cortex XSOAR
Cortex Data Lake
AutoFocus
Question 6 of 10
Which malware type is installed in the BIOS of a machine, which means operating system level tools cannot detect it?
spyware
(V) rootkit
logic bomb
ransomware
Question 7 of 10
Which Zero Trust capability provides a combination of anti-malware and intrusion prevention technologies to protect against both known and unknown threats, including mobile device threats?
inspection of all traffic
least privilege
secure access
(V) cyberthreat protection
Question 8 of 10
Which Wi-Fi attack leverages device information about which wireless networks it previously connected to?
(V) Jasager
evil twin
SSLstrip
man-in-the-middle
Question 9 of 10
Which type of phishing attack is specifically directed at senior executives or other high-profile targets within an organization?
spear phishing
(V) whaling
watering hole
pharming
Question 10 of 10
Which wireless security protocol includes improved security for IoT devices, smart bulbs, wireless appliances, and smart speakers?
WEP
WPA2
(V) WPA3
WPA1
沒有留言:
張貼留言