Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?

Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?A . Department of Homeland SecurityB . MITREC . Office of Cyber Security and Information AssuranceD . Cybersecurity Vulnerability Research CenterView AnswerAnswer: B

May 29, 2021 No Comments READ MORE +

Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?

Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?A . Cortex XSOARB . Prisma CloudC . AutoFocusD . Cortex XDRView AnswerAnswer: A

May 29, 2021 No Comments READ MORE +

Which key component is used to configure a static route?

Which key component is used to configure a static route?A . router IDB . enable settingC . routing protocolD . next hop IP addressView AnswerAnswer: D

May 28, 2021 No Comments READ MORE +

Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?

Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?A . NetOpsB . SecOpsC . SecDevOpsD . DevOpsView AnswerAnswer: B

May 28, 2021 No Comments READ MORE +

Which characteristic of serverless computing enables developers to quickly deploy application code?

Which characteristic of serverless computing enables developers to quickly deploy application code?A . Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demandB . Uploading the application code itself, without having to provision a full container image or any OS virtual...

May 27, 2021 No Comments READ MORE +

What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?

What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?A . connectors and interfacesB . infrastructure and containersC . containers and developersD . data center and UPSView AnswerAnswer: A

May 27, 2021 No Comments READ MORE +

Which endpoint product from Palo Alto Networks can help with SOC visibility?

Which endpoint product from Palo Alto Networks can help with SOC visibility?A . STIXB . Cortex XDRC . WildFireD . AutoFocusView AnswerAnswer: B

May 27, 2021 No Comments READ MORE +

Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?

Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?A . DynamicB . Pre-exploit protectionC . Bare-metalD . StaticView AnswerAnswer: A

May 26, 2021 No Comments READ MORE +

Match the Identity and Access Management (IAM) security control with the appropriate definition

DRAG DROP Match the Identity and Access Management (IAM) security control with the appropriate definition. View AnswerAnswer:

May 26, 2021 No Comments READ MORE +

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?A . XDRB . STEPC . SOARD . SIEMView AnswerAnswer: C

May 25, 2021 No Comments READ MORE +