What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?

What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?A . connectors and interfacesB . infrastructure and containersC . containers and developersD . data center and UPSView AnswerAnswer: A

May 27, 2021 No Comments READ MORE +

Which endpoint product from Palo Alto Networks can help with SOC visibility?

Which endpoint product from Palo Alto Networks can help with SOC visibility?A . STIXB . Cortex XDRC . WildFireD . AutoFocusView AnswerAnswer: B

May 27, 2021 No Comments READ MORE +

Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?

Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?A . DynamicB . Pre-exploit protectionC . Bare-metalD . StaticView AnswerAnswer: A

May 26, 2021 No Comments READ MORE +

Match the Identity and Access Management (IAM) security control with the appropriate definition

DRAG DROP Match the Identity and Access Management (IAM) security control with the appropriate definition. View AnswerAnswer:

May 26, 2021 No Comments READ MORE +

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?A . XDRB . STEPC . SOARD . SIEMView AnswerAnswer: C

May 25, 2021 No Comments READ MORE +

Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?

Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?A . Threat PreventionB . DNS SecurityC . WildFireD . URL FilteringView AnswerAnswer: D

May 24, 2021 No Comments READ MORE +

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?A . ExpeditionB . Cortex XDRC . AutoFocusD . App-IDView AnswerAnswer: B

May 22, 2021 No Comments READ MORE +

Which network analysis tool can be used to record packet captures?

Which network analysis tool can be used to record packet captures?A . Smart IP ScannerB . WiresharkC . Angry IP ScannerD . NetmanView AnswerAnswer: B

May 21, 2021 No Comments READ MORE +

Which technique changes protocols at random during a session?

Which technique changes protocols at random during a session?A . use of non-standard portsB . port hoppingC . hiding within SSL encryptionD . tunneling within commonly used servicesView AnswerAnswer: B

May 19, 2021 No Comments READ MORE +

Which option would be an example of PII that you need to prevent from leaving your enterprise network?

Which option would be an example of PII that you need to prevent from leaving your enterprise network?A . Credit card numberB . Trade secretC . National security informationD . A symmetric encryption keyView AnswerAnswer: A

May 19, 2021 No Comments READ MORE +