Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?A . XDR B. STEP C. SOAR D. SIEMView AnswerAnswer: C
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?A . endpoint antivirus software B. strong endpoint passwords C. endpoint disk encryption D. endpoint NIC ACLsView AnswerAnswer: A
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?A . Frame B. Segment C. Packet D. DataView AnswerAnswer: C Explanation: The IP stack adds source (sender) and destination (receiver)...
Which element of the security operations process is concerned with using external functions to help achieve goals?
Which element of the security operations process is concerned with using external functions to help achieve goals?A . interfaces B. business C. technology D. peopleView AnswerAnswer: A Explanation: The six pillars include:
Match the Palo Alto Networks WildFire analysis verdict with its definition
DRAG DROP Match the Palo Alto Networks WildFire analysis verdict with its definition. View AnswerAnswer: Explanation: Benign: Safe and does not exhibit malicious behavior Grayware: No security risk but might display obtrusive behavior (for example, adware, spyware, and browser helper objects) Malware: Malicious in nature and intent and can pose...
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?A . operating system patches B. full-disk encryption C. periodic data backups D. endpoint-based firewallView AnswerAnswer: B
Which key component is used to configure a static route?
Which key component is used to configure a static route?A . router ID B. enable setting C. routing protocol D. next hop IP addressView AnswerAnswer: D
Which two network resources does a directory service database contain? (Choose two.)
Which two network resources does a directory service database contain? (Choose two.)A . Services B. /etc/shadow files C. Users D. Terminal shell types on endpointsView AnswerAnswer: A,C Explanation: A directory service is a database that contains information about users, resources, and services in a network.
Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?
Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?A . an intranet-accessed contractor’s system that was compromised B. exploitation of an unpatched security vulnerability C. access by using a third-party vendor’s password D. a...
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include: