ExamGecko
Question list
Search
Search

Question 86 - PCCET discussion

Report
Export

Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.

A.
It cannot identify command-and-control traffic
Answers
A.
It cannot identify command-and-control traffic
B.
It assumes that all internal devices are untrusted
Answers
B.
It assumes that all internal devices are untrusted
C.
It assumes that every internal endpoint can be trusted
Answers
C.
It assumes that every internal endpoint can be trusted
D.
It cannot monitor all potential network ports
Answers
D.
It cannot monitor all potential network ports
Suggested answer: C

Explanation:

A perimeter-based network security strategy relies on firewalls, routers, and other devices to create a boundary between the internal network and the external network. This strategy assumes that every internal endpoint can be trusted, and that any threat comes from outside the network. However, this assumption is flawed, as internal endpoints can also be compromised by malware, phishing, insider attacks, or other methods. Once an attacker gains access to an internal endpoint, they can use it to move laterally within the network, bypassing the perimeter defenses. Therefore, a perimeter-based network security strategy is not sufficient to protect an organization's endpoint systems, and a more comprehensive approach, such as Zero Trust, is needed.Reference:

Palo Alto Networks Certified Cybersecurity Entry-level Technician (PCCET)

Traditional perimeter-based network defense is obsolete---transform to a Zero Trust model

What is Network Perimeter Security? Definition and Components | Acalvio

asked 23/09/2024
Pablo Magallanes
38 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first