On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
What protocol requires all routers in the same domain to maintain a map of the network?
Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?
Which feature of cloud-native security platforms (CNSPs) focuses on protecting virtual machine (VM), container, and serverless deployments against application-level attacks during runtime?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.
Which NIST cloud service model is this?
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
Which activities do local organization security policies cover for a SaaS application?
Which aspect of a SaaS application requires compliance with local organizational security policies?
How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
Which type of malware replicates itself to spread rapidly through a computer network?
An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
Requirements for the three subnets: Subnet 1: 3 host addresses
Subnet 2: 25 host addresses
Subnet 3: 120 host addresses
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?
In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?
In SecOps, what are two of the components included in the identify stage? (Choose two.)
What are two functions of User and Entity Behavior Analytics (UEBA) data in Prisma Cloud CSPM? (Choose two.)
Which attacker profile acts independently or as part of an unlawful organization?
Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?
In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)
Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?
Which element of the security operations process is concerned with using external functions to help achieve goals?
The customer is responsible only for which type of security when using a SaaS application?
What is a dependency for the functionality of signature-based malware detection?
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?
Which native Windows application can be used to inspect actions taken at a specific time?
On an endpoint, which method should you use to secure applications against exploits?
Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?
Which component of the AAA framework verifies user identities so they may access the network?
If an endpoint does not know how to reach its destination, what path will it take to get there?
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?