How does adopting a serverless model impact application development?
Which pillar of Prisma Cloud application security does vulnerability management fall under?
What are three benefits of SD-WAN infrastructure? (Choose three.)
What is a reason IoT devices are more susceptible to command-and-control (C2) attacks?
What is used to orchestrate, coordinate, and control clusters of containers?
What does SIEM stand for?
What is the key to “taking down” a botnet?
In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?
You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.
What deployment options do you have available? (Choose two.)
Which product from Palo Alto Networks enables organizations to prevent successful cyberattacks as well as simplify and strengthen security processes?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
Which type of system collects data and uses correlation rules to trigger alarms?
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
What are two functions of User and Entity Behavior Analytics (UEBA) data in Prisma Cloud CSPM? (Choose two.)
Which product functions as part of a SASE solution?
Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?
Which aspect of a SaaS application requires compliance with local organizational security policies?
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
What are two characteristics of an advanced persistent threat (APT)? (Choose two.)
On which security principle does virtualization have positive effects?
What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?
Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
Organizations that transmit, process, or store payment-card information must comply with what standard?
Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?
What are the two most prominent characteristics of the malware type rootkit? (Choose two.)
Which core component is used to implement a Zero Trust architecture?
Which characteristic of serverless computing enables developers to quickly deploy application code?
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?
Which two network resources does a directory service database contain? (Choose two.)
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
Which endpoint product from Palo Alto Networks can help with SOC visibility?
What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?
How does Prisma SaaS provide protection for Sanctioned SaaS applications?
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Which subnet does the host 192.168.19.36/27 belong?
What are three benefits of the cloud native security platform? (Choose three.)
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
What is the function of an endpoint detection and response (EDR) tool?
Which technology grants enhanced visibility and threat prevention locally on a device?
What are two capabilities of identity threat detection and response (ITDR)? (Choose two.)
Which type of malware takes advantage of a vulnerability on an endpoint or server?
What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?
Which tool automates remediation of a confirmed cybersecurity breach?
Which statement is true about advanced persistent threats?
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?
Which service is encompassed by serverless architecture?
Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?
Match each description to a Security Operating Platform key capability.
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?
Which two statements describe the Jasager attack? (Choose two.)
Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?
What is a dependency for the functionality of signature-based malware detection?
Which two statements apply to SaaS financial botnets? (Choose two.)
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
What is a key benefit of Cortex XDR?
Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
Which security tool provides policy enforcement for mobile users and remote networks?
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
What differentiates knowledge-based systems from behavior-based systems?
A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?
What type of attack redirects the traffic of a legitimate website to a fake website?
Which three services are part of Prisma SaaS? (Choose three.)
Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
Match the Palo Alto Networks WildFire analysis verdict with its definition.