What are two disadvantages of Static Rout ng? (Choose two.)
Answer : A, C
Static routing is a form of routing that occurs when a router uses a manually-configured routing entry, rather than information from dynamic routing traffic 1. Static routing has some advantages, such as simplicity, low overhead, and full control, but it also has some disadvantages, such as:
* Manual reconfiguration: Static routes require manual effort to configure and maintain. This can be time-consuming and error-prone, especially in large networks with many routes. If there is a change in the network topology or a link failure, the static routes need to be updated manually by the network administrator 23.
* Single point of failure: Static routing is not fault tolerant. This means that if the path used by the static route stops working, the traffic will not be rerouted automatically. The network will be unreachable until the failure is repaired or the static route is changed manually. Dynamic routing, on the other hand, can adapt to network changes and find alternative paths 23.
What are the two most prominent characteristics of the malware type rootkit? (Choose two.)
Which of the following is a Routed Protocol?
Answer : C
A routed protocol is a protocol by which data can be routed. It provides appropriate addressing information in its internet layer or network layer to allow a packet to be forwarded from one network to another network. Examples of routed protocols are the Internet Protocol (IP) and Internetwork Packet Exchange (IPX). IP is the most widely used routed protocol on the Internet and other networks. It assigns a unique logical address to each device and enables data to be fragmented, reassembled, and routed across multiple networks.Reference:
Routing v/s Routed Protocols in Computer Network
CCNA Certification: Routed Protocols vs Routing Protocols
What is the difference between Routing Protocols and Routed Protocols
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
Answer : C
A next-generation firewall (NGFW) is a security component that can detect command-and-control (C2) traffic sent from multiple endpoints within a corporate data center. A NGFW is a network device that combines traditional firewall capabilities with advanced features such as application awareness, intrusion prevention, threat intelligence, and cloud-based analysis. A NGFW can identify and block C2 traffic by inspecting the application layer protocols, signatures, and behaviors of the network traffic, as well as correlating the traffic with external sources of threat intelligence. A NGFW can also leverage inline cloud analysis to detect and prevent zero-day C2 threats in real-time. A NGFW can provide granular visibility and control over the network traffic, as well as generate alerts and reports on the C2 activity.Reference:
Palo Alto Networks Certified Cybersecurity Entry-level Technician (PCCET)
Command and Control, Tactic TA0011 - Enterprise | MITRE ATT&CK
Advanced Threat Prevention: Inline Cloud Analysis - Palo Alto Networks
With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
Answer : B
Code: This layer refers to the application code and its dependencies. Security at this layer involves ensuring the code is free of vulnerabilities, using secure coding practices, and implementing encryption, authentication, and authorization mechanisms.
Container: This layer refers to the lightweight, isolated units that encapsulate the application and its dependencies. Security at this layer involves scanning and verifying the container images, enforcing policies and rules for container deployment and runtime, and isolating and protecting the containers from unauthorized access.
Cluster: This layer refers to the group of nodes that host the containers and provide orchestration and management capabilities. Security at this layer involves securing the communication between the nodes and the containers, monitoring and auditing the cluster activity, and applying security patches and updates to the cluster components.
Cloud: This layer refers to the underlying infrastructure and services that support the cloud-native applications. Security at this layer involves configuring and hardening the cloud resources, implementing identity and access management, and complying with the cloud provider's security standards and best practices.
A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?
Answer : B
What is phishing? | Malwarebytes
Don't Panic! Here's What To Do If You Clicked On A Phishing Link
How can Malware spread through Email and How to Protect
What is phishing? How this cyber attack works and how to prevent it ...
Identifying Illegitimate Email Links | Division of Information Technology
What is whaling? | NortonLifeLock
[What is pharming? | NortonLifeLock]
[What is spam? | NortonLifeLock]