Complete Solutions
A
R
U
LA
C
O
D
,Which type of cyberattack sends extremely high volumes of network traffic such as packets,
data, or transactions that render the victim's network unavailable or unusable?
A. distributed denial-of-service (DDoS)
B. spamming botnet
C. phishing botnet
A
D. denial-of-service (DoS) - ANSA
Which core component of Cortex combines security orchestration, incident management, and
R
interactive investigation to serve security teams across the incident lifecycle?
A. AutoFocus
B. Cortex XDR
C. Cortex XSOAR
U
D. Cortex Data Lake - ANSC
Which type of advanced malware has entire sections of code that serve no purpose other than
LA
to change the signature of the malware, thus producing an infinite number of signature hashes
for even the smallest of malware programs?
A. distributed
B. polymorphic
C. multi-functional
D. obfuscated - ANSB
C
Which type of phishing attack is specifically directed at senior executives or other high-profile
targets within an organization?
A. whaling
O
B. watering hole
C. pharming
D. spear phishing - ANSA
D
Which wireless security protocol includes improved security for IoT devices, smart bulbs,
wireless appliances, and smart speakers?
A. WPA2
B. WPA3
C. WPA1
D. WEP - ANSB
Which tactic, technique, or procedure (TTP) masks application traffic over port 443 (HTTPS)?
A. using non-standard ports
,B. hopping ports
C. hiding within SSL encryption
D. tunneling - ANSC
Which specific technology is associated with Web 3.0?
A. social networks
B. instant messaging
C. remote meeting software
D. blockchain - ANSD
Which Wi-Fi attack leverages device information about which wireless networks it previously
A
connected to?
A. evil twin
B. man-in-the-middle
R
C. Jasager
D. SSLstrip - ANSC
Which malware type is installed in the BIOS of a machine, which means operating system level
U
tools cannot detect it?
A. rootkit
B. logic bomb
LA
C. ransomware
D. spyware - ANSA
Which Zero Trust capability provides a combination of anti-malware and intrusion prevention
technologies to protect against both known and unknown threats, including mobile device
threats?
C
A. least privilege
B. secure access
C. inspection of all traffic
D. cyberthreat protection - ANSD
O
Which three options describe the relationship and interaction between a customer and SaaS?
(Choose three.)
D
A. subscription service
B. extensive manpower required
C. internet- or application-based
D. complex deployment
E. convenient and economical - ANSACE
Mobile devices are easy targets for attacks for which two reasons? (Choose two.)
A. They have poor battery-charging capabilities.
B. They use speaker phones.
C. They stay in an always-on, always-present state.
, D. They roam in unsecured areas. - ANSCD
Which path or tool is used by attackers?
A. storage-area networks (SAN)
B. anti-malware update
C. SaaS
D. threat vector - ANSD
Which kind of server is a master server that is designed to listen to individual compromised
endpoints and respond with appropriate attack commands?
A. command and control
A
B. bot
C. web
D. directory services - ANSA
R
What type of malware can have multiple control servers distributed all over the world with
multiple fallback options?
A. logic bombs
U
B. rootkits
C. advanced or modern
D. exploits - ANSC
LA
Which type of malware disables protection software?
A. anti-AV
B. Trojan horse
C. ransomware
D. worm - ANSA
C
Another term for a bot is a "zombie". (True or False) - ANST
The spread of unsolicited content to targeted endpoints is known as what?
O
A. spamming
B. pharming
C. phishing
D
D. exploiting - ANSA
Which type of attack utilizes many endpoints as bots or attackers in a coordinated effort, and
can be extremely effective in taking down a website or some other publicly accessible service?
A. Bluetooth
B. adware
C. distributed denial-of-service
D. man-in-the-middle - ANSC