Institutional Training Final
Institutional Training Final
and privacy regulations for its industry, yet still not be secure.
->True
Which acronym represents a set of routines, protocols, and tools for building
software applications and integrations?
->API
Which cybersecurity act defines individual rights with respect to the privacy
of their personal information and governs how private sector organizations
collect, use, and disclose personal information in the course of business?
->Canada Personal Information Protection and Electronic Documents Act
(PIPEDA)
Which of the following techniques and tools are used by an attacker to hide
attack communications traffic?
->Process and Remote Access Tools (RATs)
->Secure Socket Layer (SSL) Encryption
->Port Hopping and Dynamic DNS
What is an easy way to make your WiFi security stronger and make it more
difficult for hackers to discover your wireless network?
->Change the Service Set Identifier (SSID)
Which of the following WLAN standards is the LEAST secure? Pick two.
->WiFi Protected Setup ( WPS)
->Wired Equivalent Privacy (WEP)
Which technique is NOT used to break the command and control (CnC) phase
of the Cyber Kill Chain®?
->Vulnerability and Patch Management
Wired Equivalent Privacy (WEP) is the most effective protocol for securing
wireless networks.
->False
Someone with limited hacking and/or programming skills that uses malicious
programs (malware) written by others to attack a computer or network is
known as a newbie.
->False
Most Botnets are designed to withstand the loss of a command and control
(CnC) server, meaning that the entire Botnet infrastructure must be disabled
almost simultaneously.
->True
Which Wildfire verdict indicates no security risk but might display obtrusive
behavior (for example, adware, spyware, and browser helper objects)?
->Grayware
Malicious software or code that typically damages, takes control of, or collects
information from an infected endpoint is known as:
->Malware
The principle of least privilege in network security requires that only the
permission or access rights necessary to perform an authorized task is denied.
->False
Which of the following techniques and tools are used by an attacker to hide
attack communications traffic?
->Secure Socket Layer (SSL) Encryption
->Port Hopping and Dynamic DNS
->Process and Remote Access Tools (RATs)
Which acronym represents a set of routines, protocols, and tools for building
software applications and integrations?
->API
Which type of Wildfire analysis method supports a custom-built, evasion-
resistant virtual environment in which previously unknown submissions are
executed within a virtualized test environment to determine real world
effects and behavior.
->Dynamic
Which Wildfire verdict indicates no security risk but might display obtrusive
behavior (for example, adware, spyware, and browser helper objects)?
->Grayware
Which cybersecurity act defines individual rights with respect to the privacy
of their personal information and governs how private sector organizations
collect, use, and disclose personal information in the course of business?
->Canada Personal Information Protection and Electronic Documents Act
(PIPEDA)
Which technique is NOT used to break the command and control (CnC) phase
of the Cyber Kill Chain®?
->Vulnerability and Patch Management
What type of attack is intended to rapidly cause damage to the victim's
network and system infrastructure, as well as their business and reputation?
->Distributed Denial of Service (DDoS)
Malicious software or code that typically damages, takes control of, or collects
information from an infected endpoint is known as:
->Malware
Ensuring your cloud resources and SaaS applications are correctly configured
and adhere to your organization’s security standards from day one is
essential to prevent successful attacks.
->True
A cloud access security broker (CASB) is software that monitors activity and
enforces security policies on traffic between an organization’s users and
cloud-based applications and services.
->True
To safely enable SaaS usage in your organization, start by clearly defining the
SaaS applications that should be used and which behaviors within those
applications are allowed. Which category of applications are not allowed, then
controlling their usage with granular policies
->Unsanctioned
Data that moves in and out of the virtualized environment from the host
network or a corresponding traditional data center is also known as:
->North-South
Which platform provides all three cloud native characteristics by default and,
while assembled from many more generic components, are highly optimized
for container workloads.
->Container as a Service
Development and Operations teams meet regularly, share analytics, and co-
own projects from beginning to end.
->True
Select the Prisma Cloud capability that decouples workload identity from IP
addresses, leverages tags and metadata to assign a logical identity to
applications and workloads, and then uses it to enforce ID-based micro-
segmentation and security policies that adapt to your dynamic environments.
->Machine identity