Which two statements about targeted attacks are true? (Choose two.)
Options:
A.
Exploits typically target vulnerabilities for which there are no patches.
B.
Targeted attacks typically employ a combination of software exploits and malware.
C.
Computer users can protect themselves effectively against targeted attacks by keeping their systems fully patched and their antivirus signature databases up to date.
D.
Attackers may gather information about their intended victims using social media.
Answer:
A, B
Question 3
In which two ways does Traps complement Palo Alto Networks perimeter protection? (Choose two.)
Options:
A.
Endpoints are sometimes operated by their users outside the corporate network perimeter.
B.
ESM servers send information about threats directly to Palo Alto Networks firewalls.
C.
Traps endpoints send information about threats directly to Palo Alto Networks firewalls.
D.
Information about threats from both Palo Alto Networks firewalls and Traps endpoints flows into a shared threat intelligence cloud.