Professional Documents
Culture Documents
NSE2 Psalinas
NSE2 Psalinas
NSE2 Psalinas
1
Correct
1 points out of 1
Flag question
Question text
What is Wi-Fi?
Select one:
Question 2
Correct
1 points out of 1
Flag question
Question text
Which change that was introduced in Wi-Fi Protected Access 2 (WPA2) strengthened
encrypted Wi-Fi communications?
Select one:
Question 3
Correct
1 points out of 1
Flag question
Question text
Digital signatures were introduced to help identify valid access points (APs).
Question 4
Incorrect
0 points out of 1
Flag question
Question text
What weakness of Wired Equivalent Privacy (WEP) made it unsuitable to secure Wi-Fi
communications?
Select one:
Question 1
Incorrect
0 points out of 1
Flag question
Question text
Select one:
Question 2
Correct
1 points out of 1
Flag question
Question text
Which two organizations are examples of a threat intelligence service that serves the
wider security community? (Choose two.)
Malware-as-a-Service
NIST
FortiGuard Labs
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
Sandboxing
Web filtering
Signature-based detection
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
Polymorphic malware is a malware family with thousands of variants but behaving the
same way.
Question 5
Correct
1 points out of 1
Flag question
Question text
Which behavior does a sandbox look for when searching for malware?
Select one:
Behaved abnormally
Matched signatures
State Finished
Points 5/5
Question 1
Correct
1 points out of 1
Flag question
Question text
Select one:
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
Connects all tools in your security stack together into defined workflows that can be
run automatically.
Combines the processes and the security tools available to exploit opportunities given
a particular situation.
Correctly orients the security team to address the cyber threat according to the
situation.
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
To synchronize tools, accelerate response times, reduce alert fatigue, and compensate
for the skill shortage gap.
To analyze workload, organize an analysts tasks, and allow teams to respond using
their own processes.
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
RFC 826
10Base-T
IEEE 802.11
ISO 5750
Question 1
Correct
1 points out of 1
Flag question
Question text
Question 2
Partially correct
1 points out of 1
Flag question
Question text
Which two cloud services are types of cloud computing? (Choose two.)
Question 3
Correct
1 points out of 1
Flag question
Question text
Who has ultimate responsibility for the safety of the customer’s data and services
hosted in the cloud?
Select one:
The customer
The cloud service provider
The cloud security syndicate
The Interpol cloud security service
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
using a network of remote servers hosted on the internet to store, manage, and
process data.
building LANs comprised of virtual servers and connected by routers to form a virtual
WAN.
connecting various computers and other network devices together using switches and
routers.
simultaneously running multiple datacenters using centralized mainframe computing.
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
Use of browser-based applications that on-premises servers could not.
Cost savings by paying for only what computer services were needed.
Greater access and control of the business data.
Greater security for organizational data and services.
Question 1
Correct
1 points out of 1
Flag question
Question text
Why might managing multiple point products cause greater complexity for IT security?
(Choose two.)
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
Redundant WAN links
Basic load balancing
Single internet service provider
Improved user interface
Question 3
Correct
1 points out of 1
Flag question
Question text
Which two benefits are gained from using an SD-WAN centralized management
console? (Choose two.)
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
is a hybrid of on-premise devices and virtual servers across multiple cloud vendors.
limits the number of switches and routers to reduce maintenance and administration.
spans a large geographic area and typically consists of two or more LANs.
uses primarily virtual computers, thus expanding the east-west axis.
Question 5
Correct
1 points out of 1
Flag question
Question text
Earlier businesses used a single, dedicated service provider to connect to the internet.
What was the primary weakness of this design?
Select one:
Overly complex
Unsecure
Inexpensive
Unreliable
Question 1
Correct
1 points out of 1
Flag question
Question text
Which two types of devices are considered endpoints, according to the description in
the lesson? (Choose two.)
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
Exploits security loopholes and spreads only in the device memory
The use of deception to manipulate individuals into divulging confidential information
A downloaded file, which when opened, runs malicious code or a script
A large number of irrelevant or inappropriate messages sent over the internet
Question 3
Correct
1 points out of 1
Flag question
Question text
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
Artificial intelligence replaced EDR and EPP technologies
EDR and EPP technologies merged
Web filtering technology replaced EPP
EPP remained but EDR technology fell out of favour
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
Antivirus (AV)
Device control
Forensics investigation tool
Web filtering
Question 6
Correct
1 points out of 1
Flag question
Question text
Identify two problems that are solved by having a single security agent on endpoints.
(Choose two.)
Question 7
Correct
1 points out of 1
Flag question
Question text
Select one:
Antivirus software on endpoints is inferior to that on servers.
Compromising endpoints offers a greater challenge.
Endpoints have a greater monetary value than other assets, such as a database.
They are an easy point of entry into a network.
Question 8
Correct
1 points out of 1
Flag question
Question text
Question 9
Correct
1 points out of 1
Flag question
Question text
Select one:
Polymorphic
Adware
File-based
Social engineering
Question 10
Correct
1 points out of 1
Flag question
Question text
Question 1
Correct
1 points out of 1
Flag question
Question text
Select one:
Next-generation firewall (NGFW)
Packet filter
Application layer
Stateful
Question 2
Correct
1 points out of 1
Flag question
Question text
Which firewall generation can you configure to allow a user to connect to Facebook,
but not watch videos from that site?
Select one:
Next-generation firewall (NGFW)
Packet filter firewall
Stateful firewall
Dynamic packet firewall
Question 3
Correct
1 points out of 1
Flag question
Question text
Which three traits are characteristics of a next generation firewall (NGFW)? (Choose
three.)
Question 4
Correct
1 points out of 1
Flag question
Question text
Complete the sentence. A packet filter firewall controls network traffic based on
Select one:
the behaviour of the network connections.
application behaviour or characteristics.
network addresses, protocols, and ports.
filtering layers 2—7 of the OSI model.
Question 5
Correct
1 points out of 1
Flag question
Question text
Which two types of firewalls can block a connection based on application type?
(Choose two.)
Question 1
Correct
1 points out of 1
Flag question
Question text
Select one:
The malware count increases daily, however it can be detected early by a one-to-one
signature approach.
There are more vendor organizations that are able to keep up with the increasing
number of malware files.
The variations of malware are easily detected thanks to the affordability of malware
kits.
It does not scale well, because the number of malware files increases by millions or
more each day.
Malware-as-a-service organizations provide do-it-yourself malware kits as a solution.
Question 2
Correct
1 points out of 1
Flag question
Question text
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
Sharing intelligence among security vendors is the best way to fight threats.
As bad actors continue to evolve it is important to invest in expensive security
products.
Security products and threat intelligence services that can act together in real time
stand the best chance of stopping these attacks.
There is no secrecy within security vendors and all information is shared.
It is important that individuals become more aware of and knowledgeable about any
attacks.
Question 4
Correct
1 points out of 1
Flag question
Question text
The threat intelligence service catalogs data about existing or emerging attacks,
including the specific mechanisms of the attack, and evidence that the attack has
happened.
What is this data also known as?
Select one:
Indicators of compromise
Machine learning
Intelligence catalogs
Sandboxing
Artificial intelligence
Question 5
Correct
1 points out of 1
Flag question
Question text
What happened when malware became more sophisticated and able to change its own
file content?
Select one:
Malware signatures did not change, and it was not able to sneak by older antivirus
products.
One new type of malware was detected per year, resulting in the growth of the
malware family.
Less sophisticated malware was still able to evade classic signature-based scanning.
A single type of malware did not multiply and no bad behavior was detected.
A single type of malware became an entire malware family, consisting of perhaps
thousands of different files, but each file performing the same bad behaviors.
Question 1
Correct
1 points out of 1
Flag question
Question text
Select one:
Reports on all endpoints that require patching.
Elevates the security team’s sense of success.
Analyzes and generates a security score to better measure improvements in network
security.
Increases your security teams efficiency by automating repetitive manual processes.
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
Situation, Orientation, Adroit, & Replication
Single out, On the board, Asked, & Repeated
Situation, Opportunity, Action, & Result
Security Orchestration, Automation, & Response
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
Correctly orients the security team to address the cyber threat according to the
situation.
Combines the processes and the security tools available to exploit opportunities given
a particular situation.
Connects all tools in your security stack together into defined workflows that can be
run automatically.
Question 4
Correct
1 points out of 1
Flag question
Question text
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
When a team reduces the number of alerts coming in using SOAR.
When a SOAR solution is overloaded with alerts.
When the number of alerts decline.
When an analyst is overwhelmed from the number of alerts coming in.
Select one:
Required as part of an air-gap solution
Mandated by government
Provide valuable data to the CFO
Can save time and money
Question 2
Correct
1 points out of 1
Flag question
Question text
What action do you typically need to do to join a public network, such as one in a
coffee shop?
Select one:
Agree to the legal terms for using the network
Register your handheld device
Submit your personal digital certificate
Provide biometric information
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
Routers
Device profile
User role
IP address
Which three parties participate in network authentication, according to the IEEE 802.1X
standards? (Choose three.)
Client device
Authentication server
Certification authority
Router
Authenticator
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
Data exfiltration
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
Mandated by government
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
User role
Device profile
Routers
IP address
Question 4
Correct
1 points out of 1
Flag question
Question text
Which three parties participate in network authentication, according to the IEEE 802.1X
standards? (Choose three.)
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
Limited RAM prevents the installation of security software
Increase the maintenance cycle for network devices
MIS does not control what is installed on these devices
Data exfiltration
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
Complying to regulations
Question 3
Correct
1 points out of 1
Flag question
Question text
Which two requirements were the motivation for SIEM? (Choose two.)
Complying to regulations
Remaining competitive
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
Question 5
Correct
1 points out of 1
Flag question
Question text
Which problem was a barrier to the general acceptance of first-generation SIEM?
Select one:
Question 1
Correct
1 points out of 1
Flag question
Question text
Select one:
Polymorphic viruses
Ransomware
Trojan horse
AI-driven attacks
Question 2
Correct
1 points out of 1
Flag question
Question text
Which feature in early networks made aggregating threat intelligence difficult?
Select one:
Virtualization
Hybrid cloud environments
Point solutions
Segmentation
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
An isolated virtual environment to test suspicious files and hyperlinks
A segment of the network reserved for testing unknown programs
A service in the Cloud used to collect and share threat intelligence
A process used to identify, describe, and categorize malware
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
Malware that converts all data bits to zeros
A cyberattack that exploits an unknown software vulnerability
A computer virus that receives instructions from a Command and Control server
A new and unknown computer virus
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
Streamlines manual testing
Scanning of encrypted data streams
Faster network speeds
Automation and artificial intelligence
Question 1
Correct
1 points out of 1
Flag question
Question text
Flag question
Question text
Question 3
Correct
1 points out of 1
Flag question
Question text
Which three tasks must technology perform to satisfy network security compliance
requirements? (Choose three.)
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
From an information platform to a threat intelligence center
From an information platform to a fully integrated and automated center for security
and network operations
As an information platform only
As a threat intelligence center only
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
Security Information and Event Manager
Security Information and Email Management
Security Information and Emergency Management
Security Information and Electronic Messaging
Question 1
Correct
1 points out of 1
Flag question
Question text
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
FortiGuard Labs is an optional feature that does not provide any benefits to FortiWeb.
FortiGuard Labs provides vital updates to FortiWeb about new threats.
FortiGuard Labs provides machine learning features to FortiWeb.
FortiGuard Labs must be integrated with FortiGate first, before integrating with
FortiWeb.
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
It provides a means for businesses to monitor which web applications their users are
accessing.
It allows applications to access online content.
It monitors and blocks malicious HTTP/HTTPS traffic to and from a web application.
It prevents applications from accessing the web at certain times of the day.
Question 4
Correct
1 points out of 1
Flag question
Question text
In which two ways does machine learning help make modern web application firewalls
more effective? (Choose two.)
Question 5
Correct
1 points out of 1
Flag question
Question text
Select one:
Block protocols
Block MAC addresses
Block SQL injection attacks
Block port numbers
Question 1
Correct
1 points out of 1
Flag question
Which method did the earliest spam filter use to stop spam?
Select one:
Question 2
Correct
1 points out of 1
Flag question
Question text
Which challenge caused secure email gateway (SEG) to adopt automation and machine
learning?
Select one:
Success of click-bait
Volume of attacks
Data loss
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
Plateaued
Increasing
Erratic
Declining
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
An attacker observes websites that a targeted group visits, and herds them into an
infected website
Question 5
Partially correct
1 points out of 1
Flag question
Question text
Which two methods are used by threat actors to compromise your device when
conducting phishing campaigns? (Choose two.)
An attachment to an email
An embedded hyperlink within an email
Click bait
Question text
Which challenge caused secure email gateway (SEG) to adopt automation and machine
learning?
Select one:
Success of click-bait
Data loss
Delay in implementing the sender policy framework
Volume of attacks
Question 2
Correct
1 points out of 1
Flag question
Question text
Select one:
Erratic
Plateaued
Declining
Increasing
Question 3
Correct
1 points out of 1
Flag question
Question text
Select one:
Fraudulent messages that target a specific role or person within an organization
Weaponized emails that claim to come from a legitimate sender
An attacker observes websites that a targeted group visits, and herds them into an
infected website
Irrelevant or inappropriate messages sent on the Internet to a large number of
recipients
Question 4
Incorrect
0 points out of 1
Flag question
Question text
Which method did the earliest spam filter use to stop spam?
Select one:
Tested emails in a sandbox environment
Detected illegitimate email addresses
Identified specific words or patterns
Detected unusual behaviour
Question 5
Correct
1 points out of 1
Flag question
Question text
Which two methods are used by threat actors to compromise your device when
conducting phishing campaigns? (Choose two.)
Question 1
Correct
1 points out of 1
Flag question
Question text
Select one:
They deny listed certain sites.
They lacked role-based filter settings.
They interfered with email traffic.
They censored information.
Question 2
Correct
1 points out of 1
Flag question
Question text
Question 3
Correct
1 points out of 1
Flag question
Question text
Which two actions describe how web filters work? (Choose two.)
Question 4
Correct
1 points out of 1
Flag question
Question text
Select one:
They tested all URLs in segregated VMs to see what they would do.
They prevented denial of service attacks.
They blocked lewd websites.
They blocked adware, spam, viruses, and spyware.
Question 5
Incorrect
0 points out of 1
Flag question
Question text
Aside from blocking content, what other use does a web filter have?
Select one:
Facilitating network traffic throughput
Testing files on segregated VMs
Categorizing content
Searching for content
Question 6
Correct
1 points out of 1
Flag question
Question text
Select one:
Web filters are rule-based.
Web filters use big data comparative analysis.
Web filter use heuristics.
Web filters are role-based.