Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?
Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?A . visibility, governance, and complianceB . network protectionC . dynamic computingD . compute securityView AnswerAnswer: A Explanation: Ensuring that your cloud resources and SaaS applications are correctly configured and adhere to...
What does SIEM stand for?
What does SIEM stand for?A . Security Infosec and Event ManagementB . Security Information and Event ManagementC . Standard Installation and Event MediaD . Secure Infrastructure and Event MonitoringView AnswerAnswer: B Explanation: Originally designed as a tool to assist organizations with compliance and industry-specific regulations, security information and event management...
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?A . Global ProtectB . WildFireC . AutoFocusD . STIXView AnswerAnswer: C Explanation: page 173 "AutoFocus makes over a billion samples and sessions, including...
Match the Identity and Access Management (IAM) security control with the appropriate definition
DRAG DROP Match the Identity and Access Management (IAM) security control with the appropriate definition. View AnswerAnswer:
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?A . connectors and interfacesB . infrastructure and containersC . containers and developersD . data center and UPSView AnswerAnswer: A Explanation: Connectors and interfaces are the components...
What are two key characteristics of a Type 1 hypervisor? (Choose two.)
What are two key characteristics of a Type 1 hypervisor? (Choose two.)A . is hardened against cyber attacksB . runs without any vulnerability issuesC . runs within an operating systemD . allows multiple, virtual (or guest) operating systems to run concurrently on a single physical host computerView AnswerAnswer: A D...
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?A . during the selective network security virtualization phase, all intra-host communication paths are strictly controlledB . during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy serverC . during the...
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?A . Department of Homeland SecurityB . MITREC . Office of Cyber Security and Information AssuranceD . Cybersecurity Vulnerability Research CenterView AnswerAnswer: B Explanation: MITRE is a not-for-profit organization that operates research and development centers...
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?A . DynamicB . Pre-exploit protectionC . Bare-metalD . StaticView AnswerAnswer: A Explanation: Dynamic analysis is a method of malware analysis that executes the malware in a controlled environment and observes its behavior...
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?A . Group policyB . StatelessC . StatefulD . Static packet-filterView AnswerAnswer: C Explanation: Stateful packet inspection firewalls Second-generation...