Domain 4 - Securing Traffic Flashcards
If you have a Threat Prevention subscription but not a WildFire subscription, how long must you wait for the WildFire signatures to be added into the antivirus update?
a. 1 to 2 hours
b. 2 to 4 hours
c. 10 to 12 hours
d. 24 to 48 hours
D. 24 to 48 Hours
What are two benefits of Vulnerability Protection Security profiles? (Chose two)
a. They prevent compromised hosts from trying to communicate with external C2 servers.
b. They protect against viruses, worms and Trojans.
c. They prevent exploitation of system flaws.
d. They prevent unauthorized access to systems.
c. They prevent exploitation of system flaws.
d. They prevent unauthorized access to systems.
Which two actions are available for Antivirus Security profiles? (Choose two)
a. Continue
b. Allow
c. Block IP
d. Alert
b. Allow
d. Alert
Which two actions are required to implement DNS Security inspections of traffic? (Choose two)
a. Add an Anti-Spyware Security profile with DNS remediations to a Security policy.
b. Enable the Advanced DNS Security check box in General Settings.
c. Configure an Anti-Spyware Security profile with DNS remediations.
d. Enter the address for the Secure DNS service in the firewall’s DNS settings
a. Add an Anti-Spyware Security profile with DNS remediations to a Security policy.
c. Configure an Anti-Spyware Security profile with DNS remediations
Which two types of attacks does the PAN-DB prevent? (Choose two)
a. Phishing site
b. HTTP-based command and control
c. Infected Javascript
d. Flood attacks
a. Phishing site
b. HTTP-based command and control
Which two valid URLs can be used in a custom URL category? (Choose two)
a. www.youtube.**
b. www.**.com
c. www.youtube.com
d. youtube
e. *.youtube.com
c. www.youtube.com
e. *.youtube.com
A URL Filtering Profile is part of which type of identification?
a. App-ID
b. Content-ID
c. User-ID
d. Service
b. Content-ID
What are the two components of Denial-of-Service Protection? (Choose two)
a. Zone Protection Profile
b. DoS Protection Profile and policy rules
c. Load Protection
d. Reconnaissance protection
a. Zone Protection Profile
b. DoS Protection Profile and policy rules