What is the key to “taking down” a botnet?
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?
Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
Match the IoT connectivity description with the technology.
What is used to orchestrate, coordinate, and control clusters of containers?
Why is it important to protect East-West traffic within a private cloud?
Which of the following is an AWS serverless service?
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Which of these ports is normally associated with HTTPS?
How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?
A native hypervisor runs:
Which statement is true about advanced persistent threats?
In the network diagram below, which device is the router?
Which two network resources does a directory service database contain? (Choose two.)
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?
Which tool supercharges security operations center (SOC) efficiency with the world’s most comprehensive operating platform for enterprise security?
Which characteristic of serverless computing enables developers to quickly deploy application code?
Match the Palo Alto Networks WildFire analysis verdict with its definition.
Match the DNS record type to its function within DNS.
You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.
What deployment options do you have available? (Choose two.)
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?
Which element of the security operations process is concerned with using external functions to help achieve goals?
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
Under which category does an application that is approved by the IT department, such as Office 365, fall?
TCP is the protocol of which layer of the OSI model?
What protocol requires all routers in the same domain to maintain a map of the network?
What does “forensics” refer to in a Security Operations process?
At which layer of the OSI model are routing protocols defined?
Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?
In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?
Which option is a Prisma Access security service?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?
Which network analysis tool can be used to record packet captures?
With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?
Which method is used to exploit vulnerabilities, services, and applications?
Which technique changes protocols at random during a session?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
Which subnet does the host 192.168.19.36/27 belong?
In SecOps, what are two of the components included in the identify stage? (Choose two.)
In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?