March Sale Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Paloalto Networks PSE-Endpoint-Associate Dumps

PSE: Endpoint Associate training for Traps 4.0 Questions and Answers

Question 1

Which two statements about targeted attacks are true? (Choose two.)

Options:

A.

Exploits typically target vulnerabilities for which there are no patches.

B.

Targeted attacks typically employ a combination of software exploits and malware.

C.

Computer users can protect themselves effectively against targeted attacks by keeping their systems fully patched and their antivirus signature databases up to date.

D.

Attackers may gather information about their intended victims using social media.

Question 2

In which two ways does Traps complement Palo Alto Networks perimeter protection? (Choose two.)

Options:

A.

Endpoints are sometimes operated by their users outside the corporate network perimeter.

B.

ESM servers send information about threats directly to Palo Alto Networks firewalls.

C.

Traps endpoints send information about threats directly to Palo Alto Networks firewalls.

D.

Information about threats from both Palo Alto Networks firewalls and Traps endpoints flows into a shared threat intelligence cloud.

Question 3

Which two statements about advanced cyberthreats are true? (Choose two.)

Options:

A.

It is very common for attacks to use previously unknown malware.

B.

A zero-day vulnerability is defined as a security flaw of which the vulnerable product's vendor has no prior awareness.

C.

It is impractical to protect against zero-day attacks.

D.

A zero-day vulnerability is defined as a security flaw of which the vulnerable product's customers have no prior awareness.