Moneyball Sdr Quiz - June 2014

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Kruban
K
Kruban
Community Contributor
Quizzes Created: 3 | Total Attempts: 2,866
Questions: 11 | Attempts: 112

SettingsSettingsSettings
Moneyball Sdr Quiz - June 2014 - Quiz

Questions and Answers
  • 1. 

    Bonus question:  In the space below, develop 1 WYWYN email to a prospect (this would be considered your initial touch point with this contact).  The email format should contain all components of the WYWYN message.

  • 2. 

    According to ADC, what is the most common attack vector or vulnerability?

    • A.

      Cross Site Scripting

    • B.

      SQL Injection

    • C.

      Directory traversal

    • D.

      DDoS

    Correct Answer
    A. Cross Site Scripting
    Explanation
    Cross Site Scripting (XSS) is the most common attack vector or vulnerability according to ADC. XSS occurs when an attacker injects malicious scripts into a trusted website, which then executes on the user's browser. This allows the attacker to steal sensitive information, manipulate website content, or redirect users to malicious websites. XSS attacks are prevalent due to the widespread use of web applications and the difficulty in validating user input, making it a significant concern for website security.

    Rate this question:

  • 3. 

    What are the main data feed sources for our Community Defense offering?

    • A.

      Imperva SecureSphere WAFs

    • B.

      Third party sources’

    • C.

      Imperva’s ADC

    • D.

      A and C

    Correct Answer
    D. A and C
    Explanation
    The main data feed sources for our Community Defense offering are Imperva SecureSphere WAFs and Imperva's ADC. These two sources provide valuable data and information that can be used to enhance the security and defense of our community. They provide insights into potential threats and attacks, allowing us to take proactive measures to protect our systems and users. By utilizing these data feed sources, we can stay ahead of emerging threats and ensure the safety of our community.

    Rate this question:

  • 4. 

    According to the ADC threat research, what are the 3 countries that produce the most attacks?

    • A.

      China

    • B.

      United States

    • C.

      Egypt

    • D.

      Syria

    • E.

      Russia

    • F.

      India

    Correct Answer(s)
    A. China
    C. Egypt
    D. Syria
    Explanation
    China, Egypt, and Syria are the three countries that produce the most attacks according to the ADC threat research. This suggests that these countries have a higher number of cybercriminals or hacking groups that are actively engaging in malicious activities such as hacking, phishing, or launching cyber-attacks. The research findings indicate that these countries pose a significant threat in terms of cybersecurity and should be closely monitored for potential cyber threats.

    Rate this question:

  • 5. 

    ThreatRadar allows companies to evaluate both the geographical location AND the reputation of an IP address?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    ThreatRadar is a tool that enables companies to assess the geographical location and reputation of an IP address. This means that it provides information on both where the IP address is located and the reputation associated with it. Therefore, the statement is true.

    Rate this question:

  • 6. 

    While prospecting to people you've interacted with in the past, "touching base, following up and / or checking in" are great conversation starters that drive value?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    "Touching base, following up, and checking in" are not necessarily great conversation starters that drive value. While these phrases may be used to initiate a conversation, they do not guarantee that the conversation will be valuable or productive. The value of a conversation depends on various factors such as the context, the purpose of the interaction, and the quality of the communication. Therefore, the statement that these phrases are great conversation starters that drive value is false.

    Rate this question:

  • 7. 

    What component of the "Why You Why You Now" email is missing from this message?Subject: Your Policy on Web Security Mr. Logan- I saw a recent article where FAA ordered Boeing to protect some of their planes that have increased connectivity against hackers and cyber attacks.  This prompted me to reach out to you because many of our government and aerospace customers use Imperva to prevent unwanted data breaches by stopping hackers and suspicious traffic at the door, and not allowing access to guarded data center assets.  NASA uses Imperva’s Web Application Firewall to protect their websites from external threats, as well as some parts of the FAA itself. What is the best way to get 15 minutes on your calendar to see if Imperva can help support your mission at the FAA regional offices and enterprise-wide? Rep NameImperva - Security Practicewww.imperva.com(P) 123-456-7890

    • A.

      Attention Grabber

    • B.

      Subject Line

    • C.

      Why You

    • D.

      Call to Action

    • E.

      Why You and a Trigger

    • F.

      All components are listed

    • G.

      Why You Now

    Correct Answer
    F. All components are listed
  • 8. 

    Gartner's Magic Quadrant for WAF was recently announced and Imperva was the only vendor listed in the Visionary quadrant?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    The given statement is false. The question states that Imperva was the only vendor listed in the Visionary quadrant of Gartner's Magic Quadrant for WAF. However, without any further information or context, it is not possible to determine the accuracy of this statement. Therefore, the answer is false.

    Rate this question:

  • 9. 

    Imperva customers use our solutions to answer questions like (check all that apply):

    • A.

      How are our app's protected?

    • B.

      Who can access our data?

    • C.

      Who is using our data?

    • D.

      Are we compliant?

    • E.

      Is our network perimeter secure?

    Correct Answer(s)
    A. How are our app's protected?
    B. Who can access our data?
    C. Who is using our data?
    D. Are we compliant?
    Explanation
    Imperva customers use our solutions to answer questions related to the protection of their applications, the access to their data, the identification of the users of their data, and the compliance of their operations. These questions are crucial for organizations to ensure the security and integrity of their systems and to meet regulatory requirements. By using Imperva solutions, customers can gain insights into how their applications are protected, control who can access their data, track who is using their data, and ensure compliance with relevant standards and regulations.

    Rate this question:

  • 10. 

    At the end of 2018, less than 20% of enterprises will rely only on firewalls or intrusion prevention systems to protect their Web applications — down from 40% today.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that by the end of 2018, less than 20% of enterprises will solely depend on firewalls or intrusion prevention systems for safeguarding their web applications. This indicates a decrease from the current figure of 40%. Therefore, the statement is true as it implies a reduction in reliance on these security measures.

    Rate this question:

Back to Top Back to top
Advertisement