When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
In SecOps, what are two of the components included in the identify stage? (Choose two.)
What is the recommended method for collecting security logs from multiple endpoints?
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
What type of DNS record maps an IPV6 address to a domain or subdomain to another hostname?
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)
Which type of malware takes advantage of a vulnerability on an endpoint or server?
Match the Identity and Access Management (IAM) security control with the appropriate definition.
Which element of the security operations process is concerned with using external functions to help achieve goals?
An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
Requirements for the three subnets: Subnet 1: 3 host addresses
Subnet 2: 25 host addresses
Subnet 3: 120 host addresses
Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?
A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.
Which NIST cloud service model is this?
Layer 4 of the TCP/IP Model corresponds to which three Layer(s) of the OSI Model? (Choose three.)
In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?
Which tool supercharges security operations center (SOC) efficiency with the world’s most comprehensive operating platform for enterprise security?
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
If an endpoint does not know how to reach its destination, what path will it take to get there?
What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?
What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?
In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?
Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?