In SecOps, what are two of the components included in the identify stage? (Choose two.)
What is a dependency for the functionality of signature-based malware detection?
Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
Which network firewall primarily filters traffic based on source and destination IP address?
What is the recommended method for collecting security logs from multiple endpoints?
What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
Which attacker profile acts independently or as part of an unlawful organization?
Which component of the AAA framework regulates user access and permissions to resources?
Which element of the security operations process is concerned with using external functions to help achieve goals?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?
Which endpoint protection security option can prevent malware from executing software?
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
Which activities do local organization security policies cover for a SaaS application?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Which action is unique to the security orchestration, automation, and response (SOAR) platforms?
In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?
Which pillar of Prisma Cloud application security does vulnerability management fall under?
Which two network resources does a directory service database contain? (Choose two.)
In a traditional data center what is one result of sequential traffic analysis?
A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.
Which NIST cloud service model is this?
The seventy of an attack needs to be escalated.
What needs to be in place in order for the security operations team to properly inform various units within the enterprise of the issue?
Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?
Which type of portable architecture can package software with dependencies in an isolated unit?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?
Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?
From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?
Which characteristic of serverless computing enables developers to quickly deploy application code?
In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?
What are two common lifecycle stages for an advanced persistent threat (APT) that is infiltrating a network? (Choose two.)
What are the two most prominent characteristics of the malware type rootkit? (Choose two.)