View Mode
Q: 11
A financial organization uses endpoint security software across all employee devices. Which approach ensures the endpoints remain protected against the latest vulnerabilities and exploits?
Options
Q: 12
During an investigation into unusual network activity, a SOC analyst identifies a high volume of outbound traffic from a specific server to an unknown external IP address. What is the most effective next step to proceed with the investigation?
Options
Q: 13
A Security Operations Center (SOC) team is tasked with improving their visibility across the organization’s network. Which of the following measures is the most effective to enhance visibility for threat detection and response?
Options
Q: 14
An e-commerce company is evaluating its processes for vulnerability management. Which process most effectively reflects the pillars of effective security operations?
Options
Q: 15
You are configuring a Palo Alto Networks firewall for an organization. The goal is to allow inbound traffic from a trusted partner's IP range (192.168.10.0/24) to access the organization's web server on port 443 securely. At the same time, you must block all other traffic from untrusted external sources to the web server. Which two actions correctly configure the firewall rules to meet the requirements? (Choose two)
Options
Q: 16
Which of the following best describes the primary function of a Data Loss Prevention (DLP) system in network security?
Options
Q: 17
Which of the following best describes a primary objective of a ransomware attack?
Options
Q: 18
Which of the following best illustrates how endpoint security and network security complement each other in a cybersecurity strategy?
Options
Q: 19
What is the primary function of a proxy in network security?
Options
Q: 20
A security administrator is responsible for managing the firewalls in a distributed enterprise network. The administrator notices that some firewalls have outdated antivirus and application signature databases. Which of the following practices would best ensure the consistent deployment of security updates across the organization?
Options
Question 11 of 20 · Page 2 / 2

Premium Access Includes

  • Quiz Simulator
  • Exam Mode
  • Progress Tracking
  • Question Saving
  • Flash Cards
  • Drag & Drops
  • 3 Months Access
  • PDF Downloads
Get Premium Access
Scroll to Top

FLASH OFFER

Days
Hours
Minutes
Seconds

avail 10% DISCOUNT on YOUR PURCHASE