SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?A . Use of non-standard ports B. Hiding within SSL encryption C. Port hopping D. Tunneling within commonly used servicesView AnswerAnswer: D
On an endpoint, which method should you use to secure applications against exploits?
On an endpoint, which method should you use to secure applications against exploits?A . endpoint-based firewall B. strong user passwords C. full-disk encryption D. software patchesView AnswerAnswer: D Explanation: New software vulnerabilities and exploits are discovered all the time and thus diligent software patch management is required by system and...
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?A . cybercriminals B. state-affiliated groups C. hacktivists D. cyberterroristsView AnswerAnswer: D
Which option is an example of a North-South traffic flow?
Which option is an example of a North-South traffic flow?A . Lateral movement within a cloud or data center B. An internal three-tier application C. Client-server interactions that cross the edge perimeter D. Traffic between an internal server and internal userView AnswerAnswer: C Explanation: North-south refers to data packets that...
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)A . Birthplace B. Login 10 C. Profession D. NameView AnswerAnswer: A,D
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?A . operating system patches B. full-disk encryption C. periodic data backups D. endpoint-based firewallView AnswerAnswer: B
What deployment options do you have available?
You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads. What deployment options do you have available? (Choose two.)A . PA-Series B. VM-Series C. Panorama D. CN-SeriesView AnswerAnswer: A,B
What is the recommended method for collecting security logs from multiple endpoints?
What is the recommended method for collecting security logs from multiple endpoints?A . Leverage an EDR solution to request the logs from endpoints. B. Connect to the endpoints remotely and download the logs. C. Configure endpoints to forward logs to a SIEM. D. Build a script that pulls down the...
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?A . exploitation B. actions on the objective C. command and control D. installationView AnswerAnswer: C Explanation: Command and Control: Attackers establish...