Palo Alto Networks PSE: Endpoint Associate training for Traps 4.0 Sample Questions:
1. Which three statements about the trusted publisher mechanism are true? (Choose three.)
A) The list of trusted publishers is maintained through content updates.
B) The trusted-publisher mechanism is called whenever an executable file would otherwise get an Unknown or No Connection verdict.
C) No executable will be affected by the trusted-publisher mechanism unless it is signed by a publisher on a list maintained by Palo Alto Networks.
D) The trusted-publisher mechanism takes precedence over verdict overrides by administrators.
E) The trusted-publisher mechanism allows trusted signed executables to run without seeking a WildFire verdict.
F) The trusted-publisher mechanism blocks executables from running unless they are signed by a trusted publisher.
2. Which two statements about targeted attacks are true? (Choose two.)
A) Exploits typically target vulnerabilities for which there are no patches.
B) Targeted attacks typically employ a combination of software exploits and malware.
C) Computer users can protect themselves effectively against targeted attacks by keeping their systems fully patched and their antivirus signature databases up to date.
D) Attackers may gather information about their intended victims using social media.
Solutions:
Question # 1 Answer: A,B,D | Question # 2 Answer: A,B |