You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.
What deployment options do you have available? (Choose two.)
A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.
Which type of phishing attack does this represent?
Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?
Which native Windows application can be used to inspect actions taken at a specific time?
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?
Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?
Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?
Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?
Which network firewall primarily filters traffic based on source and destination IP address?
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)
Given the graphic, match each stage of the cyber-attack lifecycle to its description.
What are the two most prominent characteristics of the malware type rootkit? (Choose two.)
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
What are two advantages of security orchestration, automation, and response (SOAR)? (Choose two.)
What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
On an endpoint, which method should you use to secure applications against exploits?
Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?
In a traditional data center what is one result of sequential traffic analysis?
What is a dependency for the functionality of signature-based malware detection?
What protocol requires all routers in the same domain to maintain a map of the network?
Which security function enables a firewall to validate the operating system version of a device before granting it network access?
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
Which type of system collects data and uses correlation rules to trigger alarms?
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?
Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?
How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?
Which attacker profile acts independently or as part of an unlawful organization?
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?