Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?

Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?A . Global Protect B. WildFire C. AutoFocus D. STIXView AnswerAnswer: C Explanation: page 173 "AutoFocus makes over a billion samples and sessions, including...

April 8, 2023 No Comments READ MORE +

What is the purpose of SIEM?

What is the purpose of SIEM?A . Securing cloud-based applications B. Automating the security team’s incident response C. Real-time monitoring and analysis of security events D. Filtering webpages employees are allowed to accessView AnswerAnswer: C

April 7, 2023 No Comments READ MORE +

Which NIST cloud service model is this?

A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor. Which NIST cloud service model is this?A . IaaS B. SaaS C. PaaS D. CaaSView AnswerAnswer: B Explanation: SaaS...

April 7, 2023 No Comments READ MORE +

Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?

Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?A . DNS Security B. URL Filtering C. WildFire D. Threat PreventionView AnswerAnswer: C Explanation: "The WildFire cloud-based malware analysis environment is a cyber threat prevention...

April 7, 2023 No Comments READ MORE +

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:

April 7, 2023 No Comments READ MORE +

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?A . XDR B. STEP C. SOAR D. SIEMView AnswerAnswer: C

April 7, 2023 No Comments READ MORE +

Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?

Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?A . User-ID B. Device-ID C. App-ID D. Content-IDView AnswerAnswer: C Explanation: App-ID™ technology leverages the power of the broad global community to provide continuous identification, categorization, and granular risk-based control of...

April 7, 2023 No Comments READ MORE +

Which method is used to exploit vulnerabilities, services, and applications?

Which method is used to exploit vulnerabilities, services, and applications?A . encryption B. port scanning C. DNS tunneling D. port evasionView AnswerAnswer: D Explanation: Attack communication traffic is usually hidden with various techniques and tools, including: Encryption with SSL, SSH (Secure Shell), or some other custom or proprietary encryption Circumvention...

April 6, 2023 No Comments READ MORE +

Web 2.0 applications provide which type of service?

Web 2.0 applications provide which type of service?A . SaaS B. FWaaS C. IaaS D. PaaSView AnswerAnswer: D

April 6, 2023 No Comments READ MORE +

Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?

Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?A . Knowledge-based B. Signature-based C. Behavior-based D. Database-basedView AnswerAnswer: C Explanation: IDSs and IPSs also can be classified as knowledge-based (or signature-based)...

April 6, 2023 No Comments READ MORE +