How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
A firewall administrator needs to efficiently deploy corporate account configurations and VPN settings to targeted mobile devices within the network.
Which technology meets this requirement?
What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?
Which component of cloud security is used to identify misconfigurations during the development process?
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?
Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?
What is a dependency for the functionality of signature-based malware detection?
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?
What role do containers play in cloud migration and application management strategies?
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?
What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
Which security tool provides policy enforcement for mobile users and remote networks?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
Which element of the security operations process is concerned with using external functions to help achieve goals?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
What type of DNS record maps an IPV6 address to a domain or subdomain to another hostname?
Which two network resources does a directory service database contain? (Choose two.)
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
Which attacker profile acts independently or as part of an unlawful organization?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?
A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive ' s login credentials for a system update.
Which type of phishing attack does this represent?
Which product from Palo Alto Networks enables organizations to prevent successful cyberattacks as well as simplify and strengthen security processes?
What are two advantages of security orchestration, automation, and response (SOAR)? (Choose two.)
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
Which type of portable architecture can package software with dependencies in an isolated unit?
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?
Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?
Which type of malware replicates itself to spread rapidly through a computer network?
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?
Which technology secures software-as-a-service (SaaS) applications and network data, and also enforces compliance policies for application access?
Which option would be an example of PII that you need to prevent from leaving your enterprise network?