Which activities do local organization security policies cover for a SaaS application?

Which activities do local organization security policies cover for a SaaS application?A . how the data is backed up in one or more locationsB . how the application can be usedC . how the application processes the dataD . how the application can transit the InternetView AnswerAnswer: B

June 1, 2021 No Comments READ MORE +

Which type of Wi-Fi attack depends on the victim initiating the connection?

Which type of Wi-Fi attack depends on the victim initiating the connection?A . Evil twinB . JasagerC . ParagerD . MiraiView AnswerAnswer: B

June 1, 2021 No Comments READ MORE +

On an endpoint, which method should you use to secure applications against exploits?

On an endpoint, which method should you use to secure applications against exploits?A . endpoint-based firewallB . strong user passwordsC . full-disk encryptionD . software patchesView AnswerAnswer: A

June 1, 2021 No Comments READ MORE +

Given the graphic, match each stage of the cyber-attack lifecycle to its description

DRAG DROP Given the graphic, match each stage of the cyber-attack lifecycle to its description. View AnswerAnswer:

June 1, 2021 No Comments READ MORE +

Match the description with the VPN technology

DRAG DROP Match the description with the VPN technology. View AnswerAnswer:

May 31, 2021 No Comments READ MORE +

Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?

Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?A . Global ProtectB . WildFireC . AutoFocusD . STIXView AnswerAnswer: C

May 31, 2021 No Comments READ MORE +

A native hypervisor runs:

A native hypervisor runs:A . with extreme demands on network throughputB . only on certain platformsC . within an operating system’s environmentD . directly on the host computer’s hardwareView AnswerAnswer: D

May 30, 2021 No Comments READ MORE +

Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?

Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?A . MineMeldB . AutoFocusC . WildFireD . Cortex XDRView AnswerAnswer: D

May 30, 2021 No Comments READ MORE +

Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?

Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?A . North-South trafficB . Intrazone trafficC . East-West trafficD . Interzone trafficView AnswerAnswer: A

May 30, 2021 No Comments READ MORE +

What is the primary security focus after consolidating data center hypervisor hosts within trust levels?

What is the primary security focus after consolidating data center hypervisor hosts within trust levels?A . control and protect inter-host traffic using routers configured to use the Border Gateway Protocol (BGP) dynamic routing protocolB . control and protect inter-host traffic by exporting all your traffic logs to a sysvol log...

May 29, 2021 No Comments READ MORE +