DRAG DROP
Match the task for server settings in group mapping with its order in the process.
Select and Place:
DRAG DROP
Match each set of terms to their associated security layer.
Select and Place:
Which option describes a characteristic of a distributed denial-of-service attack?
A. uses multiple types of malware to corrupt system services
B. uses a single remote host to delete data from multiple target servers
C. uses a single remote host to flood a target network with traffic
D. uses a botnet to flood traffic to a target network
From which resource can a Palo Alto Networks firewall get URL category information for URLs whose categories cannot be found on the firewall?
A. App-ID database
B. WildFire
C. PDF file
D. PAN-DB database
Which well-known port is associated with the Simple Mail Transfer Protocol?
A. 143
B. 25
C. 997
D. 40
An attacker emails a malicious URL links to 50,000 email addresses. The email states that users can click the link to view the latest celebrity news, but the link also secretly infects the user's laptop. This scenario describes which type of attack?
A. whailing
B. phishing
C. drive-by download
D. pharming
How does machine learning enhance WildFire operation?
A. analyzes file sample characteristics during static analysis
B. determines which file samples should be forwarded to WildFire
C. determines the optimum OS WildFire uses to analyze file samples
D. analyzes file sample characteristics during dynamic analysis
On an endpoint, which method should you use to secure applications against exploits?
A. full-disk encryption
B. strong user passwords
C. software patches
D. endpoint-based firewall