Which element of the security operations process is concerned with using external functions to help achieve goals?

Which element of the security operations process is concerned with using external functions to help achieve goals?A . interfaces B. business C. technology D. peopleView AnswerAnswer: A Explanation: The six pillars include:

October 7, 2022 No Comments READ MORE +

Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?

Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?A . Group policy B. Stateless C. Stateful D. Static packet-filterView AnswerAnswer: C Explanation: Stateful packet inspection firewalls Second-generation...

October 7, 2022 No Comments READ MORE +

Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?

Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?A . Benign B. Tolerated C. Sanctioned D. SecureView AnswerAnswer: C

October 7, 2022 No Comments READ MORE +

Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?

Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?A . SaaS B. DaaS C. PaaS D. IaaSView AnswerAnswer: D

October 7, 2022 No Comments READ MORE +

Match the description with the VPN technology

DRAG DROP Match the description with the VPN technology. View AnswerAnswer:

October 7, 2022 No Comments READ MORE +

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:

October 6, 2022 No Comments READ MORE +

Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?

Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?A . visibility, governance, and compliance B. network protection C. dynamic computing D. compute securityView AnswerAnswer: A Explanation: Ensuring that your cloud resources and SaaS applications are correctly configured and adhere to...

October 6, 2022 No Comments READ MORE +

In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?

In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?A . Cortex XDR B. AutoFocus C. MineMild D. Cortex XSOARView AnswerAnswer: A Explanation: In addition to local analysis, Cortex XDR can send unknown files to WildFire for...

October 6, 2022 No Comments READ MORE +

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?A . XDR B. STEP C. SOAR D. SIEMView AnswerAnswer: C

October 5, 2022 No Comments READ MORE +

Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?

Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?A . endpoint antivirus software B. strong endpoint passwords C. endpoint disk encryption D. endpoint NIC ACLsView AnswerAnswer: A

October 5, 2022 No Comments READ MORE +