1.
Bonus question: In the space below, develop 1 WYWYN email to a prospect (this would be considered your initial touch point with this contact). The email format should contain all components of the WYWYN message.
2.
According to ADC, what is the most common attack vector or vulnerability?
Correct Answer
A. Cross Site Scripting
Explanation
Cross Site Scripting (XSS) is the most common attack vector or vulnerability according to ADC. XSS occurs when an attacker injects malicious scripts into a trusted website, which then executes on the user's browser. This allows the attacker to steal sensitive information, manipulate website content, or redirect users to malicious websites. XSS attacks are prevalent due to the widespread use of web applications and the difficulty in validating user input, making it a significant concern for website security.
3.
What are the main data feed sources for our Community Defense offering?
Correct Answer
D. A and C
Explanation
The main data feed sources for our Community Defense offering are Imperva SecureSphere WAFs and Imperva's ADC. These two sources provide valuable data and information that can be used to enhance the security and defense of our community. They provide insights into potential threats and attacks, allowing us to take proactive measures to protect our systems and users. By utilizing these data feed sources, we can stay ahead of emerging threats and ensure the safety of our community.
4.
According to the ADC threat research, what are the 3 countries that produce the most attacks?
Correct Answer(s)
A. China
C. Egypt
D. Syria
Explanation
China, Egypt, and Syria are the three countries that produce the most attacks according to the ADC threat research. This suggests that these countries have a higher number of cybercriminals or hacking groups that are actively engaging in malicious activities such as hacking, phishing, or launching cyber-attacks. The research findings indicate that these countries pose a significant threat in terms of cybersecurity and should be closely monitored for potential cyber threats.
5.
ThreatRadar allows companies to evaluate both the geographical location AND the reputation of an IP address?
Correct Answer
A. True
Explanation
ThreatRadar is a tool that enables companies to assess the geographical location and reputation of an IP address. This means that it provides information on both where the IP address is located and the reputation associated with it. Therefore, the statement is true.
6.
While prospecting to people you've interacted with in the past, "touching base, following up and / or checking in" are great conversation starters that drive value?
Correct Answer
B. False
Explanation
"Touching base, following up, and checking in" are not necessarily great conversation starters that drive value. While these phrases may be used to initiate a conversation, they do not guarantee that the conversation will be valuable or productive. The value of a conversation depends on various factors such as the context, the purpose of the interaction, and the quality of the communication. Therefore, the statement that these phrases are great conversation starters that drive value is false.
7.
What component of the "Why You Why You Now" email is missing from this message?Subject: Your Policy on Web Security Mr. Logan- I saw a recent article where FAA ordered Boeing to protect some of their planes that have increased connectivity against hackers and cyber attacks. This prompted me to reach out to you because many of our government and aerospace customers use Imperva to prevent unwanted data breaches by stopping hackers and suspicious traffic at the door, and not allowing access to guarded data center assets. NASA uses Imperva’s Web Application Firewall to protect their websites from external threats, as well as some parts of the FAA itself. What is the best way to get 15 minutes on your calendar to see if Imperva can help support your mission at the FAA regional offices and enterprise-wide? Rep NameImperva - Security Practicewww.imperva.com(P) 123-456-7890
Correct Answer
F. All components are listed
8.
Gartner's Magic Quadrant for WAF was recently announced and Imperva was the only vendor listed in the Visionary quadrant?
Correct Answer
B. False
Explanation
The given statement is false. The question states that Imperva was the only vendor listed in the Visionary quadrant of Gartner's Magic Quadrant for WAF. However, without any further information or context, it is not possible to determine the accuracy of this statement. Therefore, the answer is false.
9.
Imperva customers use our solutions to answer questions like (check all that apply):
Correct Answer(s)
A. How are our app's protected?
B. Who can access our data?
C. Who is using our data?
D. Are we compliant?
Explanation
Imperva customers use our solutions to answer questions related to the protection of their applications, the access to their data, the identification of the users of their data, and the compliance of their operations. These questions are crucial for organizations to ensure the security and integrity of their systems and to meet regulatory requirements. By using Imperva solutions, customers can gain insights into how their applications are protected, control who can access their data, track who is using their data, and ensure compliance with relevant standards and regulations.
10.
At the end of 2018, less than 20% of enterprises will rely only on firewalls or intrusion prevention systems to protect their Web applications — down from 40% today.
Correct Answer
A. True
Explanation
The statement suggests that by the end of 2018, less than 20% of enterprises will solely depend on firewalls or intrusion prevention systems for safeguarding their web applications. This indicates a decrease from the current figure of 40%. Therefore, the statement is true as it implies a reduction in reliance on these security measures.