On an endpoint, which method should you use to secure applications against exploits?
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?
In a traditional data center what is one result of sequential traffic analysis?
Which tool supercharges security operations center (SOC) efficiency with the world’s most comprehensive operating platform for enterprise security?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
The customer is responsible only for which type of security when using a SaaS application?
In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?
Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?
Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?
Which pillar of Prisma Cloud application security does vulnerability management fall under?
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
Requirements for the three subnets: Subnet 1: 3 host addresses
Subnet 2: 25 host addresses
Subnet 3: 120 host addresses
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?