Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?
Which technology grants enhanced visibility and threat prevention locally on a device?
What is a reason IoT devices are more susceptible to command-and-control (C2) attacks?
Which component of the AAA framework verifies user identities so they may access the network?
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
Which term describes establishment of on-premises software on a cloud-based server?
Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?
What are two capabilities of identity threat detection and response (ITDR)? (Choose two.)
Which capability does Cloud Security Posture Management (CSPM) provide for threat detection within Prisma Cloud?