DRAG DROP
Match the attack definition to the type of security method used to protect against the attack.
Select and Place:
When accessing an intranet website, a certificate error is received. What can be done to move past the certificate error and
ensure that the error is not received the next time the website is accessed?
A
Which security component should be used to prevent a malware attack delivered by USB drive?
C
How does machine learning enhance WildFire operation?
D
Which two components are part of a next-generation firewall security policy? (Choose two.)
B C
Which device would an Evil Twin attack use to lure the victim to connect to the attack surface network?
D
Which type of cloud computing service provides access to email and word processing applications running in a cloud
infrastructure?
A
Which type of malware is self-replicating but must first infect a host program and be executed by a user or process?
B
Which network method securely connects two sites across a public network?
A
Which component of a digital certificate provides authentication of the certificate’s issuer?
A
What does a hypervisor enable?
D
DRAG DROP
Match the OSI network model Layer 3 function to the correct description.
Select and Place:
Which two remote access methods are secure because they encrypt traffic? (Choose two.)
B C
Which type of adversary would commit cybercrimes with the authorization of their country’s government?
A
Which protocol converts voice into a digital signal?
B