Which activities do local organization security policies cover for a SaaS application?
Which activities do local organization security policies cover for a SaaS application?A . how the data is backed up in one or more locationsB . how the application can be usedC . how the application processes the dataD . how the application can transit the InternetView AnswerAnswer: B
Which type of Wi-Fi attack depends on the victim initiating the connection?
Which type of Wi-Fi attack depends on the victim initiating the connection?A . Evil twinB . JasagerC . ParagerD . MiraiView AnswerAnswer: B
On an endpoint, which method should you use to secure applications against exploits?
On an endpoint, which method should you use to secure applications against exploits?A . endpoint-based firewallB . strong user passwordsC . full-disk encryptionD . software patchesView AnswerAnswer: A
Given the graphic, match each stage of the cyber-attack lifecycle to its description
DRAG DROP Given the graphic, match each stage of the cyber-attack lifecycle to its description. View AnswerAnswer:
Match the description with the VPN technology
DRAG DROP Match the description with the VPN technology. View AnswerAnswer:
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?A . Global ProtectB . WildFireC . AutoFocusD . STIXView AnswerAnswer: C
A native hypervisor runs:
A native hypervisor runs:A . with extreme demands on network throughputB . only on certain platformsC . within an operating system’s environmentD . directly on the host computer’s hardwareView AnswerAnswer: D
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?A . MineMeldB . AutoFocusC . WildFireD . Cortex XDRView AnswerAnswer: D
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?A . North-South trafficB . Intrazone trafficC . East-West trafficD . Interzone trafficView AnswerAnswer: A
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?A . control and protect inter-host traffic using routers configured to use the Border Gateway Protocol (BGP) dynamic routing protocolB . control and protect inter-host traffic by exporting all your traffic logs to a sysvol log...