Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks Exam PSE-Endpoint-Associate Topic 1 Question 58 Discussion

Actual exam question for Palo Alto Networks's PSE-Endpoint-Associate exam
Question #: 58
Topic #: 1
[All PSE-Endpoint-Associate Questions]

A user receives an email that has piece of malware as an attachment. Choose the true statement.

Show Suggested Answer Hide Answer
Suggested Answer: A, C

Contribute your Thoughts:

Marvel
23 days ago
Who would even open an email attachment these days? That's like handing your house keys to a stranger and saying 'go crazy!'
upvoted 0 times
...
Alise
28 days ago
Option B seems reasonable, but I think Yaeko has it right. The malware is just waiting for the user to give it a free pass.
upvoted 0 times
Louisa
2 days ago
A: So, the piece of malware can work only if the user opens the attachment.
upvoted 0 times
...
Brittni
3 days ago
B: I agree, it's waiting for the user to open the attachment.
upvoted 0 times
...
Lonny
5 days ago
A: I think the malware can do damage only if it makes a connection to a command-and-control server.
upvoted 0 times
...
...
Olen
2 months ago
I agree with Yaeko. Malware is like a hungry lion - it needs to be 'let out of the cage' to cause any real damage.
upvoted 0 times
Frank
9 days ago
C) The piece of malware can work only if it begins with a buffer overflow.
upvoted 0 times
...
Fausto
18 days ago
B) The piece of malware can do damage only if it makes a connection to a command-and-control server.
upvoted 0 times
...
Margery
23 days ago
B) The piece of malware can do damage only if it makes a connection to a command-and-control server.
upvoted 0 times
...
Elouise
24 days ago
A) The piece of malware can work only if a corresponding application is on the user's system.
upvoted 0 times
...
Colette
1 months ago
A) The piece of malware can work only if a corresponding application is on the user's system.
upvoted 0 times
...
...
Yaeko
2 months ago
Option D is the correct answer. The malware can only work if the user opens the attachment, which allows it to execute on the system.
upvoted 0 times
...
Oren
2 months ago
But if the user doesn't open the attachment, how can the malware do any damage?
upvoted 0 times
...
Paris
2 months ago
I disagree, I believe the answer is B.
upvoted 0 times
...
Oren
2 months ago
I think the answer is D.
upvoted 0 times
...

Save Cancel