3 Months Free Update
3 Months Free Update
3 Months Free Update
A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?
Which endpoint product from Palo Alto Networks can help with SOC visibility?
Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?
Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?
Which attacker profile acts independently or as part of an unlawful organization?
Which action must Secunty Operations take when dealing with a known attack?
Which pillar of Prisma Cloud application security does vulnerability management fall under?
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?
Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?
In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)
What are the two most prominent characteristics of the malware type rootkit? (Choose two.)
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
Which method is used to exploit vulnerabilities, services, and applications?
A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.
Which NIST cloud service model is this?
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Which type of malware replicates itself to spread rapidly through a computer network?
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
Which type of malware takes advantage of a vulnerability on an endpoint or server?
Which network firewall primarily filters traffic based on source and destination IP address?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?