Which of the following is a CI/CD platform?
Which of the following is a CI/CD platform?A . Github B. Jira C. Atom.io D. JenkinsView AnswerAnswer: D
Which native Windows application can be used to inspect actions taken at a specific time?
Which native Windows application can be used to inspect actions taken at a specific time?A . Event Viewer B. Timeline inspector C. Task Manager D. Task SchedulerView AnswerAnswer: A
In SecOps, what are two of the components included in the identify stage? (Choose two.)
In SecOps, what are two of the components included in the identify stage? (Choose two.)A . Initial Research B. Change Control C. Content Engineering D. Breach ResponseView AnswerAnswer: A,C
Which network device breaks networks into separate broadcast domains?
Which network device breaks networks into separate broadcast domains?A . Hub B. Layer 2 switch C. Router D. Wireless access pointView AnswerAnswer: C Explanation: A layer 2 switch will break up collision domains but not broadcast domains. To break up broadcast domains you need a Layer 3 switch with vlan...
Which type of LAN technology is being displayed in the diagram?
Which type of LAN technology is being displayed in the diagram? A . Star Topology B. Spine Leaf Topology C. Mesh Topology D. Bus TopologyView AnswerAnswer: A
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?A . DevSecOps improves pipeline security by assigning the security team as the lead team for continuous deployment B. DevSecOps ensures the pipeline has horizontal intersections for application code deployment C. DevSecOps unites the Security team with the Development and Operations...
Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?
Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?A . Statistical-based B. Knowledge-based C. Behavior-based D. Anomaly-basedView AnswerAnswer: B Explanation: A knowledge-based system uses a database of known vulnerabilities and attack profiles to identify intrusion attempts. These types of systems have lower...
Order the OSI model with Layer7 at the top and Layer1 at the bottom
DRAG DROP Order the OSI model with Layer7 at the top and Layer1 at the bottom. View AnswerAnswer:
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?A . Global Protect B. WildFire C. AutoFocus D. STIXView AnswerAnswer: C Explanation: page 173 "AutoFocus makes over a billion samples and sessions, including...
What is the purpose of SIEM?
What is the purpose of SIEM?A . Securing cloud-based applications B. Automating the security team’s incident response C. Real-time monitoring and analysis of security events D. Filtering webpages employees are allowed to accessView AnswerAnswer: C