Match each description to a Security Operating Platform key capability
DRAG DROP Match each description to a Security Operating Platform key capability. View AnswerAnswer: Explanation: Reduce the attack surface: Best-of-breed technologies that are natively integrated provide a prevention architecture that inherently reduces the attack surface. This type of architecture allows organizations to exert positive control based on applications, users, and...
What is the key to “taking down” a botnet?
What is the key to “taking down” a botnet?A . prevent bots from communicating with the C2 B. install openvas software on endpoints C. use LDAP as a directory service D. block Docker engine software on endpointsView AnswerAnswer: A
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?A . Cortex XSOAR B. Prisma Cloud C. AutoFocus D. Cortex XDRView AnswerAnswer: A Explanation: SOAR tools ingest aggregated alerts from detection sources (such as SIEMs, network security tools, and mailboxes) before executing...
A native hypervisor runs:
A native hypervisor runs:A . with extreme demands on network throughput B. only on certain platforms C. within an operating system’s environment D. directly on the host computer’s hardwareView AnswerAnswer: D Explanation: Type 1 (native or bare metal). Runs directly on the host computer’s hardware Type 2 (hosted). Runs within...
Which option is an example of a North-South traffic flow?
Which option is an example of a North-South traffic flow?A . Lateral movement within a cloud or data center B. An internal three-tier application C. Client-server interactions that cross the edge perimeter D. Traffic between an internal server and internal userView AnswerAnswer: C Explanation: North-south refers to data packets that...
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:
Which NIST cloud service model is this?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor. Which NIST cloud service model is this?A . IaaS B. SaaS C. PaaS D. CaaSView AnswerAnswer: B Explanation: SaaS...
Which aspect of a SaaS application requires compliance with local organizational security policies?
Which aspect of a SaaS application requires compliance with local organizational security policies?A . Types of physical storage media used B. Data-at-rest encryption standards C. Acceptable use of the SaaS application D. Vulnerability scanning and managementView AnswerAnswer: C
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?A . Threat Prevention B. DNS Security C. WildFire D. URL FilteringView AnswerAnswer: D Explanation:...
Which element of the security operations process is concerned with using external functions to help achieve goals?
Which element of the security operations process is concerned with using external functions to help achieve goals?A . interfaces B. business C. technology D. peopleView AnswerAnswer: A Explanation: The six pillars include: