What is a component of a public key infrastructure?
A. Key Distribution Center
B. KDC ticket
C. SSH key
D. certificate authority
Which type of malware is self-replicating but must first infect a host program and be executed by a user or process?
A. vulnerability
B. worm
C. exploit
D. virus
You discover malware has corrupted the BIOS on your laptop. Which type of malware is this?
A. bootkit
B. exploit
C. rootkit
D. vulnerability
Which Palo Alto Networks technology safely enables business use of mobile devices by providing a unique solution to manage the device, protect the device, and control the data?
A. AutoFocus
B. WildFire
C. GlobalProtect
D. Traps
Which type of cloud computing service provides access to email and word processing applications running in a cloud infrastructure?
A. software as a service
B. computing as a service
C. platform as a service
D. infrastructure as a service
Which two remote access methods are secure because they encrypt traffic? (Choose two.)
A. IPsec-AH
B. SSH
C. VPN
D. Telnet
E. rlogin
Which action must be taken prior to a successful ransomware attack to enable recovery from the attack?
A. create a data snapshot on your IDS device
B. back up all hosts that contain critical data
C. update all firewall malware signatures
D. limit external exposure of internal DNS resource records
Palo Alto Networks Traps is natively integrated with which Palo Alto Networks offering to protect against unknown exploits and malware threats?
A. MineMeld
B. WildFire
C. Content-ID
D. AutoFocus