Q: 11
A financial organization uses endpoint security software across all employee devices. Which approach
ensures the endpoints remain protected against the latest vulnerabilities and exploits?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
During an investigation into unusual network activity, a SOC analyst identifies a high volume of outbound
traffic from a specific server to an unknown external IP address. What is the most effective next step to
proceed with the investigation?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 13
A Security Operations Center (SOC) team is tasked with improving their visibility across the
organization’s network. Which of the following measures is the most effective to enhance visibility for
threat detection and response?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 14
An e-commerce company is evaluating its processes for vulnerability management. Which process most
effectively reflects the pillars of effective security operations?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
You are configuring a Palo Alto Networks firewall for an organization. The goal is to allow inbound traffic
from a trusted partner's IP range (192.168.10.0/24) to access the organization's web server on port 443
securely. At the same time, you must block all other traffic from untrusted external sources to the web
server. Which two actions correctly configure the firewall rules to meet the requirements? (Choose two)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 16
Which of the following best describes the primary function of a Data Loss Prevention (DLP) system in
network security?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 17
Which of the following best describes a primary objective of a ransomware attack?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 18
Which of the following best illustrates how endpoint security and network security complement each
other in a cybersecurity strategy?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 19
What is the primary function of a proxy in network security?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 20
A security administrator is responsible for managing the firewalls in a distributed enterprise network. The
administrator notices that some firewalls have outdated antivirus and application signature databases.
Which of the following practices would best ensure the consistent deployment of security updates across
the organization?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2