Which NIST cloud service model is this?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor. Which NIST cloud service model is this?A . IaaS B. SaaS C. PaaS D. CaaSView AnswerAnswer: B Explanation: SaaS...
Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?
Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?A . DNS Security B. URL Filtering C. WildFire D. Threat PreventionView AnswerAnswer: C Explanation: "The WildFire cloud-based malware analysis environment is a cyber threat prevention...
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?A . XDR B. STEP C. SOAR D. SIEMView AnswerAnswer: C
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?A . User-ID B. Device-ID C. App-ID D. Content-IDView AnswerAnswer: C Explanation: App-ID™ technology leverages the power of the broad global community to provide continuous identification, categorization, and granular risk-based control of...
Which method is used to exploit vulnerabilities, services, and applications?
Which method is used to exploit vulnerabilities, services, and applications?A . encryption B. port scanning C. DNS tunneling D. port evasionView AnswerAnswer: D Explanation: Attack communication traffic is usually hidden with various techniques and tools, including: Encryption with SSL, SSH (Secure Shell), or some other custom or proprietary encryption Circumvention...
Web 2.0 applications provide which type of service?
Web 2.0 applications provide which type of service?A . SaaS B. FWaaS C. IaaS D. PaaSView AnswerAnswer: D
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?A . Knowledge-based B. Signature-based C. Behavior-based D. Database-basedView AnswerAnswer: C Explanation: IDSs and IPSs also can be classified as knowledge-based (or signature-based)...
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?A . You may have to use port numbers greater than 1024 for your business-critical applications. B. You may have to open up multiple ports and these ports...
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include: