Which two network resources does a directory service database contain? (Choose two.)
Which term describes establishment of on-premises software on a cloud-based server?
What is an advantage of virtual firewalls over physical firewalls for internal segmentation when placed in a data center?
The seventy of an attack needs to be escalated.
What needs to be in place in order for the security operations team to properly inform various units within the enterprise of the issue?
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)
Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Which component of the AAA framework verifies user identities so they may access the network?
Layer 4 of the TCP/IP Model corresponds to which three Layer(s) of the OSI Model? (Choose three.)
Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?
What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)
Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?
Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?
Which feature of cloud-native security platforms (CNSPs) focuses on protecting virtual machine (VM), container, and serverless deployments against application-level attacks during runtime?
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
Which component of cloud security is used to identify misconfigurations during the development process?
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
In a traditional data center what is one result of sequential traffic analysis?
Which product from Palo Alto Networks enables organizations to prevent successful cyberattacks as well as simplify and strengthen security processes?
How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?
Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Which capability does Cloud Security Posture Management (CSPM) provide for threat detection within Prisma Cloud?
Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?
Which type of malware replicates itself to spread rapidly through a computer network?
Which security tool provides policy enforcement for mobile users and remote networks?
Which technology grants enhanced visibility and threat prevention locally on a device?
Which architecture model uses virtual machines (VMs) in a public cloud environment?
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
Which pillar of Prisma Cloud application security does vulnerability management fall under?