Order the OSI model with Layer7 at the top and Layer1 at the bottom.
Answer : A, D
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
Answer : D
page 211 'Consolidating servers within trust levels: Organizations often consolidate servers within the same trust level into a single virtual computing environment: ... ... ... This virtual systems capability enables a single physical device to be used to simultaneously meet the unique requirements of multiple VMs or groups of VMs. Control and protection of inter-host traffic with physical network security appliances that are properly positioned and configured is the primary security focus.'
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
Answer : B
SP 800-145, The NIST Definition of Cloud Computing | CSRC
Final Version of NIST Cloud Computing Definition Published
NIST Cloud Computing Program - NCCP | NIST
SaaS - User responsible for only the data, vendor responsible for rest
What protocol requires all routers in the same domain to maintain a map of the network?
Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?
Answer : C
'The WildFire cloud-based malware analysis environment is a cyber threat prevention service that identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment. WildFire automatically disseminates updated protections in near-real time to immediately prevent threats from spreading; this occurs without manual intervention'
What are three benefits of SD-WAN infrastructure? (Choose three.)
Answer : B, C, E
Simplicity: Because each device is centrally managed, with routing based on application policies, WAN managers can create and update security rules in real time as network requirements change. Also, when SD-WAN is combined with zero-touch provisioning, a feature that helps automate the deployment and configuration processes, organizations can further reduce the complexity, resources, and operating expenses required to spin up new sites. Improved performance: By allowing efficient access to cloud-based resources without the need to backhaul traffic to centralized locations, organizations can provide a better user experience.