When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)A . decrypt the infected file using base64 B. alert system administrators C. quarantine the infected file D. delete the infected file E. remove the infected file’s extension View Answer Answer: C,D,E...
Which element of the security operations process is concerned with using external functions to help achieve goals?
Which element of the security operations process is concerned with using external functions to help achieve goals?A . interfaces B. business C. technology D. people View Answer Answer: A Explanation: The six pillars include:...
Match each description to a Security Operating Platform key capability
DRAG DROP Match each description to a Security Operating Platform key capability. View Answer Answer: Explanation: Reduce the attack surface: Best-of-breed technologies that are natively integrated provide a prevention architecture that inherently reduces the attack surface. This type of architecture allows organizations to exert positive control based on applications, users, and content, with support...
What is the key to “taking down” a botnet?
What is the key to “taking down” a botnet?A . prevent bots from communicating with the C2 B. install openvas software on endpoints C. use LDAP as a directory service D. block Docker engine software on endpoints View Answer Answer: A...
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?A . Cortex XSOAR B. Prisma Cloud C. AutoFocus D. Cortex XDR View Answer Answer: A Explanation: SOAR tools ingest aggregated alerts from detection sources (such as SIEMs, network security tools, and mailboxes) before executing automatable, process-driven...
A native hypervisor runs:
A native hypervisor runs:A . with extreme demands on network throughput B. only on certain platforms C. within an operating system’s environment D. directly on the host computer’s hardware View Answer Answer: D Explanation: Type 1 (native or bare metal). Runs directly on the host computer’s hardware Type 2 (hosted). Runs within an operating...
Which option is an example of a North-South traffic flow?
Which option is an example of a North-South traffic flow?A . Lateral movement within a cloud or data center B. An internal three-tier application C. Client-server interactions that cross the edge perimeter D. Traffic between an internal server and internal user View Answer Answer: C Explanation: North-south refers to data packets that move in...
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. Business View Answer Answer: A,C,E Explanation: The six pillars include:...
Which NIST cloud service model is this?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor. Which NIST cloud service model is this?A . IaaS B. SaaS C. PaaS D. CaaS View Answer Answer: B Explanation: SaaS – User...
Which aspect of a SaaS application requires compliance with local organizational security policies?
Which aspect of a SaaS application requires compliance with local organizational security policies?A . Types of physical storage media used B. Data-at-rest encryption standards C. Acceptable use of the SaaS application D. Vulnerability scanning and management View Answer Answer: C...