Which of the following is a CI/CD platform?

Which of the following is a CI/CD platform?A . Github B. Jira C. Atom.io D. JenkinsView AnswerAnswer: D

April 11, 2023 No Comments READ MORE +

Which native Windows application can be used to inspect actions taken at a specific time?

Which native Windows application can be used to inspect actions taken at a specific time?A . Event Viewer B. Timeline inspector C. Task Manager D. Task SchedulerView AnswerAnswer: A

April 10, 2023 No Comments READ MORE +

In SecOps, what are two of the components included in the identify stage? (Choose two.)

In SecOps, what are two of the components included in the identify stage? (Choose two.)A . Initial Research B. Change Control C. Content Engineering D. Breach ResponseView AnswerAnswer: A,C

April 10, 2023 No Comments READ MORE +

Which network device breaks networks into separate broadcast domains?

Which network device breaks networks into separate broadcast domains?A . Hub B. Layer 2 switch C. Router D. Wireless access pointView AnswerAnswer: C Explanation: A layer 2 switch will break up collision domains but not broadcast domains. To break up broadcast domains you need a Layer 3 switch with vlan...

April 10, 2023 No Comments READ MORE +

Which type of LAN technology is being displayed in the diagram?

Which type of LAN technology is being displayed in the diagram? A . Star Topology B. Spine Leaf Topology C. Mesh Topology D. Bus TopologyView AnswerAnswer: A

April 10, 2023 No Comments READ MORE +

How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?

How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?A . DevSecOps improves pipeline security by assigning the security team as the lead team for continuous deployment B. DevSecOps ensures the pipeline has horizontal intersections for application code deployment C. DevSecOps unites the Security team with the Development and Operations...

April 9, 2023 No Comments READ MORE +

Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?

Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?A . Statistical-based B. Knowledge-based C. Behavior-based D. Anomaly-basedView AnswerAnswer: B Explanation: A knowledge-based system uses a database of known vulnerabilities and attack profiles to identify intrusion attempts. These types of systems have lower...

April 9, 2023 No Comments READ MORE +

Order the OSI model with Layer7 at the top and Layer1 at the bottom

DRAG DROP Order the OSI model with Layer7 at the top and Layer1 at the bottom. View AnswerAnswer:

April 8, 2023 No Comments READ MORE +

Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?

Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?A . Global Protect B. WildFire C. AutoFocus D. STIXView AnswerAnswer: C Explanation: page 173 "AutoFocus makes over a billion samples and sessions, including...

April 8, 2023 No Comments READ MORE +

What is the purpose of SIEM?

What is the purpose of SIEM?A . Securing cloud-based applications B. Automating the security team’s incident response C. Real-time monitoring and analysis of security events D. Filtering webpages employees are allowed to accessView AnswerAnswer: C

April 7, 2023 No Comments READ MORE +