Which pillar of Prisma Cloud application security does vulnerability management fall under?

Which pillar of Prisma Cloud application security does vulnerability management fall under?A . dynamic computing B. identity security C. compute security D. network protectionView AnswerAnswer: C Explanation: Prisma Cloud comprises four pillars: Visibility, governance, and compliance. Gain deep visibility into the security posture of multicloud environments. Track everything that gets...

September 28, 2022 No Comments READ MORE +

Which type of LAN technology is being displayed in the diagram?

Which type of LAN technology is being displayed in the diagram? A . Star Topology B. Spine Leaf Topology C. Mesh Topology D. Bus TopologyView AnswerAnswer: A

September 27, 2022 No Comments READ MORE +

In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?

In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?A . Computer B. Switch C. Infrastructure D. CloudView AnswerAnswer: D Explanation: Cortex XDR breaks the silos of traditional detection and response by natively integrating network, endpoint, and cloud data to...

September 26, 2022 No Comments READ MORE +

Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?

Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?A . MineMeld B. AutoFocus C. WildFire D. Cortex XDRView AnswerAnswer: B Explanation: "Palo Alto Networks AutoFocus enables a proactive, prevention-based approach to network security that puts automation to work for security professionals. Threat...

September 26, 2022 No Comments READ MORE +

Which element of the security operations process is concerned with using external functions to help achieve goals?

Which element of the security operations process is concerned with using external functions to help achieve goals?A . interfaces B. business C. technology D. peopleView AnswerAnswer: A Explanation: The six pillars include:

September 26, 2022 No Comments READ MORE +

Which activities do local organization security policies cover for a SaaS application?

Which activities do local organization security policies cover for a SaaS application?A . how the data is backed up in one or more locationsB . how the application can be usedC . how the application processes the dataD . how the application can transit the InternetView AnswerAnswer: B

June 1, 2021 No Comments READ MORE +

Which type of Wi-Fi attack depends on the victim initiating the connection?

Which type of Wi-Fi attack depends on the victim initiating the connection?A . Evil twinB . JasagerC . ParagerD . MiraiView AnswerAnswer: B

June 1, 2021 No Comments READ MORE +

On an endpoint, which method should you use to secure applications against exploits?

On an endpoint, which method should you use to secure applications against exploits?A . endpoint-based firewallB . strong user passwordsC . full-disk encryptionD . software patchesView AnswerAnswer: A

June 1, 2021 No Comments READ MORE +

Given the graphic, match each stage of the cyber-attack lifecycle to its description

DRAG DROP Given the graphic, match each stage of the cyber-attack lifecycle to its description. View AnswerAnswer:

June 1, 2021 No Comments READ MORE +

Match the description with the VPN technology

DRAG DROP Match the description with the VPN technology. View AnswerAnswer:

May 31, 2021 No Comments READ MORE +