Which element of the security operations process is concerned with using external functions to help achieve goals?
Which element of the security operations process is concerned with using external functions to help achieve goals?A . interfaces B. business C. technology D. peopleView AnswerAnswer: A Explanation: The six pillars include:
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?A . Group policy B. Stateless C. Stateful D. Static packet-filterView AnswerAnswer: C Explanation: Stateful packet inspection firewalls Second-generation...
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?A . Benign B. Tolerated C. Sanctioned D. SecureView AnswerAnswer: C
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?A . SaaS B. DaaS C. PaaS D. IaaSView AnswerAnswer: D
Match the description with the VPN technology
DRAG DROP Match the description with the VPN technology. View AnswerAnswer:
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:
Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?
Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?A . visibility, governance, and compliance B. network protection C. dynamic computing D. compute securityView AnswerAnswer: A Explanation: Ensuring that your cloud resources and SaaS applications are correctly configured and adhere to...
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?A . Cortex XDR B. AutoFocus C. MineMild D. Cortex XSOARView AnswerAnswer: A Explanation: In addition to local analysis, Cortex XDR can send unknown files to WildFire for...
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?A . XDR B. STEP C. SOAR D. SIEMView AnswerAnswer: C
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?A . endpoint antivirus software B. strong endpoint passwords C. endpoint disk encryption D. endpoint NIC ACLsView AnswerAnswer: A