Which technology grants enhanced visibility and threat prevention locally on a device?
Which type of system collects data and uses correlation rules to trigger alarms?
What is an advantage of virtual firewalls over physical firewalls for internal segmentation when placed in a data center?
Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?
Which type of portable architecture can package software with dependencies in an isolated unit?
A firewall administrator needs to efficiently deploy corporate account configurations and VPN settings to targeted mobile devices within the network.
Which technology meets this requirement?
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
What is a reason IoT devices are more susceptible to command-and-control (C2) attacks?
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?