Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)
Match each tunneling protocol to its definition.
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
Which type of Wi-Fi attack depends on the victim initiating the connection?
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
Which three services are part of Prisma SaaS? (Choose three.)
Which feature is part of an intrusion prevention system (IPS)?
Which TCP/IP sub-protocol operates at the Layer7 of the OSI model?
In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?
Which method is used to exploit vulnerabilities, services, and applications?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Match the Identity and Access Management (IAM) security control with the appropriate definition.
What does SIEM stand for?
Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Which component of cloud security is used to identify misconfigurations during the development process?
Which tool supercharges security operations center (SOC) efficiency with the world’s most comprehensive operating platform for enterprise security?
Which statement describes DevOps?
Which type of malware replicates itself to spread rapidly through a computer network?
Which type of portable architecture can package software with dependencies in an isolated unit?
What differentiates knowledge-based systems from behavior-based systems?
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?
What role do containers play in cloud migration and application management strategies?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
What are two disadvantages of Static Rout ng? (Choose two.)
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
Which component of the AAA framework verifies user identities so they may access the network?
The seventy of an attack needs to be escalated.
What needs to be in place in order for the security operations team to properly inform various units within the enterprise of the issue?
How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?
Which statement describes advanced malware?
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?
Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?
Layer 4 of the TCP/IP Model corresponds to which three Layer(s) of the OSI Model? (Choose three.)
Which aspect of a SaaS application requires compliance with local organizational security policies?
What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?
Which two descriptions apply to an XDR solution? (Choose two.)
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
Which of the following is an AWS serverless service?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
What are two key characteristics of a Type 1 hypervisor? (Choose two.)
What is the purpose of SIEM?
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
Given the graphic, match each stage of the cyber-attack lifecycle to its description.
Match the DNS record type to its function within DNS.
Which action is unique to the security orchestration, automation, and response (SOAR) platforms?
Which native Windows application can be used to inspect actions taken at a specific time?
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
At which layer of the OSI model are routing protocols defined?
Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?
In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
What is a key benefit of Cortex XDR?
Which Palo Alto Networks solution has replaced legacy IPS solutions?
Why is it important to protect East-West traffic within a private cloud?
Which architecture model uses virtual machines (VMs) in a public cloud environment?
In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?
Which option is a Prisma Access security service?
How can local systems eliminate vulnerabilities?
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
Requirements for the three subnets: Subnet 1: 3 host addresses
Subnet 2: 25 host addresses
Subnet 3: 120 host addresses
Which action must Secunty Operations take when dealing with a known attack?