Which pillar of Prisma Cloud application security does vulnerability management fall under?
Which pillar of Prisma Cloud application security does vulnerability management fall under?A . dynamic computing B. identity security C. compute security D. network protectionView AnswerAnswer: C Explanation: Prisma Cloud comprises four pillars: Visibility, governance, and compliance. Gain deep visibility into the security posture of multicloud environments. Track everything that gets...
Which type of LAN technology is being displayed in the diagram?
Which type of LAN technology is being displayed in the diagram? A . Star Topology B. Spine Leaf Topology C. Mesh Topology D. Bus TopologyView AnswerAnswer: A
In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?
In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?A . Computer B. Switch C. Infrastructure D. CloudView AnswerAnswer: D Explanation: Cortex XDR breaks the silos of traditional detection and response by natively integrating network, endpoint, and cloud data to...
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?A . MineMeld B. AutoFocus C. WildFire D. Cortex XDRView AnswerAnswer: B Explanation: "Palo Alto Networks AutoFocus enables a proactive, prevention-based approach to network security that puts automation to work for security professionals. Threat...
Which element of the security operations process is concerned with using external functions to help achieve goals?
Which element of the security operations process is concerned with using external functions to help achieve goals?A . interfaces B. business C. technology D. peopleView AnswerAnswer: A Explanation: The six pillars include:
Which activities do local organization security policies cover for a SaaS application?
Which activities do local organization security policies cover for a SaaS application?A . how the data is backed up in one or more locationsB . how the application can be usedC . how the application processes the dataD . how the application can transit the InternetView AnswerAnswer: B
Which type of Wi-Fi attack depends on the victim initiating the connection?
Which type of Wi-Fi attack depends on the victim initiating the connection?A . Evil twinB . JasagerC . ParagerD . MiraiView AnswerAnswer: B
On an endpoint, which method should you use to secure applications against exploits?
On an endpoint, which method should you use to secure applications against exploits?A . endpoint-based firewallB . strong user passwordsC . full-disk encryptionD . software patchesView AnswerAnswer: A
Given the graphic, match each stage of the cyber-attack lifecycle to its description
DRAG DROP Given the graphic, match each stage of the cyber-attack lifecycle to its description. View AnswerAnswer:
Match the description with the VPN technology
DRAG DROP Match the description with the VPN technology. View AnswerAnswer: