What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?
Match the Identity and Access Management (IAM) security control with the appropriate definition.
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
Which type of system collects data and uses correlation rules to trigger alarms?
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
Which element of the security operations process is concerned with using external functions to help achieve goals?
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?
Which pillar of Prisma Cloud application security does vulnerability management fall under?
With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?
Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?
Layer 4 of the TCP/IP Model corresponds to which three Layer(s) of the OSI Model? (Choose three.)
What protocol requires all routers in the same domain to maintain a map of the network?
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.
Which type of phishing attack does this represent?
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?
Which architecture model uses virtual machines (VMs) in a public cloud environment?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
Which component of cloud security is used to identify misconfigurations during the development process?
Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
What are two limitations of signature-based anti-malware software? (Choose two.)
Organizations that transmit, process, or store payment-card information must comply with what standard?
What are two common lifecycle stages for an advanced persistent threat (APT) that is infiltrating a network? (Choose two.)
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
What is the recommended method for collecting security logs from multiple endpoints?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.
Which NIST cloud service model is this?
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?