Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intellige
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows? A. Global Protect B. WildFire C. AutoFocus D. STIX
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
What is the primary security focus after consolidating data center hypervisor hosts within trust levels? A. control and protect inter-host traffic using routers configured to use the Border Gateway Protocol (BGP) dynamic routing protocol B. control and protect inter-host traffic by exporting all your traffic logs to a sysvol log server using the User Datagram […]
Which technique changes protocols at random during a session?
Which technique changes protocols at random during a session? A. use of non-standard ports B. port hopping C. hiding within SSL encryption D. tunneling within commonly used services
Which endpoint product from Palo Alto Networks can help with SOC visibility?
Which endpoint product from Palo Alto Networks can help with SOC visibility? A. STIX B. Cortex XDR C. WildFire D. AutoFocus
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accele
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis? A. MineMeld B. AutoFocus C. WildFire D. Cortex XDR
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available throug
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website? A. Department of Homeland Security B. MITRE C. Office of Cyber Security and Information Assurance D. Cybersecurity Vulnerability Research Center
On an endpoint, which method should you use to secure applications against exploits?
On an endpoint, which method should you use to secure applications against exploits? A. endpoint-based firewall B. strong user passwords C. full-disk encryption D. software patches
Which organizational function is responsible for security automation and eventual vetting of the solution to h
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues? A. NetOps B. SecOps C. SecDevOps D. DevOps
Which term describes data packets that move in and out of the virtualized environment from the host network or
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center? A. North-South traffic B. Intrazone traffic C. East-West traffic D. Interzone traffic
Which type of Wi-Fi attack depends on the victim initiating the connection?
Which type of Wi-Fi attack depends on the victim initiating the connection? A. Evil twin B. Jasager C. Parager D. Mirai