What are two advantages of security orchestration, automation, and response (SOAR)? (Choose two.)
Which Palo Alto Networks solution has replaced legacy IPS solutions?
A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.
Which type of phishing attack does this represent?
Which type of attack includes exfiltration of data as a primary objective?