When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)

When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)A . decrypt the infected file using base64 B. alert system administrators C. quarantine the infected file D. delete the infected file E. remove the infected file’s extensionView AnswerAnswer: C,D,E

October 10, 2022 No Comments READ MORE +

Which element of the security operations process is concerned with using external functions to help achieve goals?

Which element of the security operations process is concerned with using external functions to help achieve goals?A . interfaces B. business C. technology D. peopleView AnswerAnswer: A Explanation: The six pillars include:

October 10, 2022 No Comments READ MORE +

Match each description to a Security Operating Platform key capability

DRAG DROP Match each description to a Security Operating Platform key capability. View AnswerAnswer: Explanation: Reduce the attack surface: Best-of-breed technologies that are natively integrated provide a prevention architecture that inherently reduces the attack surface. This type of architecture allows organizations to exert positive control based on applications, users, and...

October 10, 2022 No Comments READ MORE +

What is the key to “taking down” a botnet?

What is the key to “taking down” a botnet?A . prevent bots from communicating with the C2 B. install openvas software on endpoints C. use LDAP as a directory service D. block Docker engine software on endpointsView AnswerAnswer: A

October 10, 2022 No Comments READ MORE +

Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?

Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?A . Cortex XSOAR B. Prisma Cloud C. AutoFocus D. Cortex XDRView AnswerAnswer: A Explanation: SOAR tools ingest aggregated alerts from detection sources (such as SIEMs, network security tools, and mailboxes) before executing...

October 10, 2022 No Comments READ MORE +

A native hypervisor runs:

A native hypervisor runs:A . with extreme demands on network throughput B. only on certain platforms C. within an operating system’s environment D. directly on the host computer’s hardwareView AnswerAnswer: D Explanation: Type 1 (native or bare metal). Runs directly on the host computer’s hardware Type 2 (hosted). Runs within...

October 9, 2022 No Comments READ MORE +

Which option is an example of a North-South traffic flow?

Which option is an example of a North-South traffic flow?A . Lateral movement within a cloud or data center B. An internal three-tier application C. Client-server interactions that cross the edge perimeter D. Traffic between an internal server and internal userView AnswerAnswer: C Explanation: North-south refers to data packets that...

October 9, 2022 No Comments READ MORE +

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:

October 8, 2022 No Comments READ MORE +

Which NIST cloud service model is this?

A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor. Which NIST cloud service model is this?A . IaaS B. SaaS C. PaaS D. CaaSView AnswerAnswer: B Explanation: SaaS...

October 8, 2022 No Comments READ MORE +

Which aspect of a SaaS application requires compliance with local organizational security policies?

Which aspect of a SaaS application requires compliance with local organizational security policies?A . Types of physical storage media used B. Data-at-rest encryption standards C. Acceptable use of the SaaS application D. Vulnerability scanning and managementView AnswerAnswer: C

October 8, 2022 No Comments READ MORE +