From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?
Which two network resources does a directory service database contain? (Choose two.)
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?
Match the Identity and Access Management (IAM) security control with the appropriate definition.
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
Which tool supercharges security operations center (SOC) efficiency with the world’s most comprehensive operating platform for enterprise security?
In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?
What role do containers play in cloud migration and application management strategies?
In SecOps, what are two of the components included in the identify stage? (Choose two.)
What are two common lifecycle stages for an advanced persistent threat (APT) that is infiltrating a network? (Choose two.)
Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?
What are two limitations of signature-based anti-malware software? (Choose two.)
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Which pillar of Prisma Cloud application security does vulnerability management fall under?
The seventy of an attack needs to be escalated.
What needs to be in place in order for the security operations team to properly inform various units within the enterprise of the issue?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
What is a reason IoT devices are more susceptible to command-and-control (C2) attacks?
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
Which component of the AAA framework verifies user identities so they may access the network?
Organizations that transmit, process, or store payment-card information must comply with what standard?
What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?
Layer 4 of the TCP/IP Model corresponds to which three Layer(s) of the OSI Model? (Choose three.)
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
Which aspect of a SaaS application requires compliance with local organizational security policies?
In a traditional data center what is one result of sequential traffic analysis?
Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?
If an endpoint does not know how to reach its destination, what path will it take to get there?
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?
Which term describes establishment of on-premises software on a cloud-based server?
You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.
What deployment options do you have available? (Choose two.)
What is an advantage of virtual firewalls over physical firewalls for internal segmentation when placed in a data center?