Which pptype ppof ppcyberattack ppsends ppextremely pphigh ppvolumes ppof ppnetwork
pptraffic ppsuch ppas pppackets, ppdata, ppor pptransactions ppthat pprender ppthe ppvictim's
ppnetwork ppunavailable ppor ppunusable?
A. ppdistributed ppdenial-of-service pp(DDoS)
B. ppspamming ppbotnet
C. ppphishing ppbotnet
D. ppdenial-of-service pp(DoS) pp- ppAnswer ppA
Which ppcore ppcomponent ppof ppCortex ppcombines ppsecurity pporchestration,
ppincident ppmanagement, ppand ppinteractive ppinvestigation ppto ppserve ppsecurity
ppteams ppacross ppthe ppincident pplifecycle?
A. ppAutoFocus
B. ppCortex ppXDR
C. ppCortex ppXSOAR
D. ppCortex ppData ppLake pp- ppAnswer ppC
Which pptype ppof ppadvanced ppmalware pphas ppentire ppsections ppof ppcode ppthat
ppserve ppno pppurpose ppother ppthan ppto ppchange ppthe ppsignature ppof ppthe
ppmalware, ppthus ppproducing ppan ppinfinite ppnumber ppof ppsignature pphashes ppfor
ppeven ppthe ppsmallest ppof ppmalware ppprograms?
A. ppdistributed
B. pppolymorphic
C. ppmulti-functional
D. ppobfuscated pp- ppAnswer ppB
Which pptype ppof ppphishing ppattack ppis ppspecifically ppdirected ppat ppsenior
ppexecutives ppor ppother pphigh-profile pptargets ppwithin ppan pporganization?
A. ppwhaling
B. ppwatering pphole
C. pppharming
D. ppspear ppphishing pp- ppAnswer ppA
Which ppwireless ppsecurity ppprotocol ppincludes ppimproved ppsecurity ppfor ppIoT
ppdevices, ppsmart ppbulbs, ppwireless ppappliances, ppand ppsmart ppspeakers?
A. ppWPA2
B. ppWPA3
C. ppWPA1
,D. ppWEP pp- ppAnswer ppB
Which pptactic, pptechnique, ppor ppprocedure pp(TTP) ppmasks ppapplication pptraffic
ppover ppport pp443 pp(HTTPS)?
A. ppusing ppnon-standard ppports
B. pphopping ppports
C. pphiding ppwithin ppSSL ppencryption
D. pptunneling pp- ppAnswer ppC
Which ppspecific pptechnology ppis ppassociated ppwith ppWeb pp3.0?
A. ppsocial ppnetworks
B. ppinstant ppmessaging
C. ppremote ppmeeting ppsoftware
D. ppblockchain pp- ppAnswer ppD
Which ppWi-Fi ppattack ppleverages ppdevice ppinformation ppabout ppwhich ppwireless
ppnetworks ppit pppreviously ppconnected ppto?
A. ppevil pptwin
B. ppman-in-the-middle
C. ppJasager
D. ppSSLstrip pp- ppAnswer ppC
Which ppmalware pptype ppis ppinstalled ppin ppthe ppBIOS ppof ppa ppmachine, ppwhich
ppmeans ppoperating ppsystem pplevel pptools ppcannot ppdetect ppit?
A. pprootkit
B. pplogic ppbomb
C. ppransomware
D. ppspyware pp- ppAnswer ppA
Which ppZero ppTrust ppcapability ppprovides ppa ppcombination ppof ppanti-malware
ppand ppintrusion ppprevention pptechnologies ppto ppprotect ppagainst ppboth ppknown
ppand ppunknown ppthreats, ppincluding ppmobile ppdevice ppthreats?
A. ppleast ppprivilege
B. ppsecure ppaccess
C. ppinspection ppof ppall pptraffic
D. ppcyberthreat ppprotection pp- ppAnswer ppD
Which ppthree ppoptions ppdescribe ppthe pprelationship ppand ppinteraction ppbetween
ppa ppcustomer ppand ppSaaS? pp(Choose ppthree.)
A. ppsubscription ppservice
B. ppextensive ppmanpower pprequired
C. ppinternet- ppor ppapplication-based
D. ppcomplex ppdeployment
E. ppconvenient ppand ppeconomical pp- ppAnswer ppACE
Which pppath ppor pptool ppis ppused ppby ppattackers?
A. ppstorage-area ppnetworks pp(SAN)
B. ppanti-malware ppupdate
C. ppSaaS
D. ppthreat ppvector pp- ppAnswer ppD
Which ppkind ppof ppserver ppis ppa ppmaster ppserver ppthat ppis ppdesigned ppto pplisten
ppto ppindividual ppcompromised ppendpoints ppand pprespond ppwith ppappropriate
ppattack ppcommands?
A. ppcommand ppand ppcontrol
B. ppbot
C. ppweb
D. ppdirectory ppservices pp- ppAnswer ppA
What pptype ppof ppmalware ppcan pphave ppmultiple ppcontrol ppservers ppdistributed
ppall ppover ppthe ppworld ppwith ppmultiple ppfallback ppoptions?
A. pplogic ppbombs
B. pprootkits
C. ppadvanced ppor ppmodern
D. ppexploits pp- ppAnswer ppC
Which pptype ppof ppmalware ppdisables ppprotection ppsoftware?
A. ppanti-AV
B. ppTrojan pphorse
C. ppransomware
D. ppworm pp- ppAnswer ppA
The ppspread ppof ppunsolicited ppcontent ppto pptargeted ppendpoints ppis ppknown ppas
ppwhat?
A. ppspamming
B. pppharming
C. ppphishing
D. ppexploiting pp- ppAnswer ppA
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller LucieLucky. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.