Which component of the AAA framework verifies user identities so they may access the network?
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
Which technology secures software-as-a-service (SaaS) applications and network data, and also enforces compliance policies for application access?
What type of attack redirects the traffic of a legitimate website to a fake website?
Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?
Which action is unique to the security orchestration, automation, and response (SOAR) platforms?
What role do containers play in cloud migration and application management strategies?
What are two common lifecycle stages for an advanced persistent threat (APT) that is infiltrating a network? (Choose two.)
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
Which component of the AAA framework regulates user access and permissions to resources?
Which capability does Cloud Security Posture Management (CSPM) provide for threat detection within Prisma Cloud?
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
Which security tool provides policy enforcement for mobile users and remote networks?