Which endpoint product from Palo Alto Networks can help with SOC visibility?
Which endpoint product from Palo Alto Networks can help with SOC visibility?A . STIXB . Cortex XDRC . WildFireD . AutoFocusView AnswerAnswer: B Explanation: Cortex XDR is an endpoint product from Palo Alto Networks that can help with SOC visibility by allowing you to rapidly detect and respond to threats...
Why have software developers widely embraced the use of containers?
Why have software developers widely embraced the use of containers?A . Containers require separate development and production environments to promote authentic code.B . Containers share application dependencies with other containers and with their host computer.C . Containers simplify the building and deploying of cloud native applications.D . Containers are host...
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?A . SaaS B. DaaS C. PaaS D. IaaSView AnswerAnswer: D
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?A . Save it to a new file and run it in a sandbox. B. Run it against VirusTotal. C. Append it to the investigation notes but do not alter it. D....
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?A . North-South traffic B. Intrazone traffic C. East-West traffic D. Interzone trafficView AnswerAnswer: A
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?A . Group policy B. Stateless C. Stateful D. Static packet-filterView AnswerAnswer: C Explanation: Stateful packet inspection firewalls Second-generation...
Which activities do local organization security policies cover for a SaaS application?
Which activities do local organization security policies cover for a SaaS application?A . how the data is backed up in one or more locations B. how the application can be used C. how the application processes the data D. how the application can transit the InternetView AnswerAnswer: B
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?A . the network is large B. the network is small C. the network has low bandwidth requirements D. the network needs backup routesView AnswerAnswer: A Explanation: A static routing protocol requires that...
Which of the following is an AWS serverless service?
Which of the following is an AWS serverless service?A . Beta B. Kappa C. Delta D. LambdaView AnswerAnswer: D Explanation: Examples of serverless environments include Amazon Lambda and Azure Functions. Many PaaS offerings, such as Pivotal Cloud Foundry, also are effectively serverless even if they have not historically been marketed...