What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?A . connectors and interfacesB . infrastructure and containersC . containers and developersD . data center and UPSView AnswerAnswer: A
Which endpoint product from Palo Alto Networks can help with SOC visibility?
Which endpoint product from Palo Alto Networks can help with SOC visibility?A . STIXB . Cortex XDRC . WildFireD . AutoFocusView AnswerAnswer: B
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?A . DynamicB . Pre-exploit protectionC . Bare-metalD . StaticView AnswerAnswer: A
Match the Identity and Access Management (IAM) security control with the appropriate definition
DRAG DROP Match the Identity and Access Management (IAM) security control with the appropriate definition. View AnswerAnswer:
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?A . XDRB . STEPC . SOARD . SIEMView AnswerAnswer: C
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?A . Threat PreventionB . DNS SecurityC . WildFireD . URL FilteringView AnswerAnswer: D
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?A . ExpeditionB . Cortex XDRC . AutoFocusD . App-IDView AnswerAnswer: B
Which network analysis tool can be used to record packet captures?
Which network analysis tool can be used to record packet captures?A . Smart IP ScannerB . WiresharkC . Angry IP ScannerD . NetmanView AnswerAnswer: B
Which technique changes protocols at random during a session?
Which technique changes protocols at random during a session?A . use of non-standard portsB . port hoppingC . hiding within SSL encryptionD . tunneling within commonly used servicesView AnswerAnswer: B
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
Which option would be an example of PII that you need to prevent from leaving your enterprise network?A . Credit card numberB . Trade secretC . National security informationD . A symmetric encryption keyView AnswerAnswer: A