Which technique changes protocols at random during a session?
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?
What is the purpose of SIEM?
Which architecture model uses virtual machines (VMs) in a public cloud environment?
Given the graphic, match each stage of the cyber-attack lifecycle to its description.
Which option is an example of a North-South traffic flow?
Which type of system is a user entity behavior analysis (UEBA) tool?
What type of area network connects end-user devices?
What does SOAR technology use to automate and coordinate workflows?
Match each description to a Security Operating Platform key capability.
Match the Identity and Access Management (IAM) security control with the appropriate definition.
When does a TLS handshake occur?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
Which of these ports is normally associated with HTTPS?
Which technology grants enhanced visibility and threat prevention locally on a device?
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
Which SOAR feature coordinates across technologies, security teams, and external users for centralized data visibility and action?
Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?
Which aspect of a SaaS application requires compliance with local organizational security policies?
What is a function of SSL/TLS decryption?
Which of the following is an AWS serverless service?
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
In the attached network diagram, which device is the switch?
What are two examples of an attacker using social engineering? (Choose two.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
Match the Palo Alto Networks WildFire analysis verdict with its definition.
Which action must Secunty Operations take when dealing with a known attack?
What are three benefits of SD-WAN infrastructure? (Choose three.)
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
Which statement describes a host-based intrusion prevention system (HIPS)?
Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?
Which statement describes the process of application allow listing?
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
A firewall administrator needs to efficiently deploy corporate account configurations and VPN settings to targeted mobile devices within the network.
Which technology meets this requirement?
The seventy of an attack needs to be escalated.
What needs to be in place in order for the security operations team to properly inform various units within the enterprise of the issue?
From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?
Match the IoT connectivity description with the technology.
What differentiates knowledge-based systems from behavior-based systems?
How can local systems eliminate vulnerabilities?
Which tool automates remediation of a confirmed cybersecurity breach?
Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?
Which feature is part of an intrusion prevention system (IPS)?
Which component of the AAA framework regulates user access and permissions to resources?
Which type of Wi-Fi attack depends on the victim initiating the connection?
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
What is the ptrpose of automation in SOAR?
Which component of the AAA framework verifies user identities so they may access the network?
Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?
Which service is encompassed by serverless architecture?
What are two disadvantages of Static Rout ng? (Choose two.)
Which of the following is a Routed Protocol?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
What type of DNS record maps an IPV6 address to a domain or subdomain to another hostname?
What differentiates SOAR from SIEM?
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?
What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
Match the DNS record type to its function within DNS.
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?
In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?
Which characteristic of serverless computing enables developers to quickly deploy application code?
Layer 4 of the TCP/IP Model corresponds to which three Layer(s) of the OSI Model? (Choose three.)
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?