The seventy of an attack needs to be escalated.
What needs to be in place in order for the security operations team to properly inform various units within the enterprise of the issue?
Which activities do local organization security policies cover for a SaaS application?
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
Which pillar of Prisma Cloud application security does vulnerability management fall under?
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
In a traditional data center what is one result of sequential traffic analysis?
With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?
Organizations that transmit, process, or store payment-card information must comply with what standard?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Given the graphic, match each stage of the cyber-attack lifecycle to its description.
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?
What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?
Layer 4 of the TCP/IP Model corresponds to which three Layer(s) of the OSI Model? (Choose three.)
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
What protocol requires all routers in the same domain to maintain a map of the network?
Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?
A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.
Which NIST cloud service model is this?
On an endpoint, which method should you use to secure applications against exploits?
In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?
What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)
Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?
Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?
What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?