Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?

Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?A . Elastic scalability B. 5G C. External dynamic lists D. Log exportView AnswerAnswer: A

April 5, 2023 No Comments READ MORE +

Prisma access service layer?

Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?A . Network B. Management C. Cloud D. SecurityView AnswerAnswer: D Explanation: A SASE solution converges networking and security services into one unified, cloud-delivered solution (see Figure 3-12) that includes the following: Networking Software-defined...

April 4, 2023 No Comments READ MORE +

should flow?

Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?A . Shortest Path B. Hop Count C. Split Horizon D. Path VectorView AnswerAnswer: B Explanation: Routing Information Protocol (RIP) is an example of a distance-vector routing protocol that uses hop count as its routing metric. To...

April 3, 2023 No Comments READ MORE +

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)A . People B. Accessibility C. Processes D. Understanding E. BusinessView AnswerAnswer: A,C,E Explanation: The six pillars include:

April 3, 2023 No Comments READ MORE +

On which security principle does virtualization have positive effects?

On which security principle does virtualization have positive effects?A . integrity B. confidentiality C. availability D. non-repudiationView AnswerAnswer: C

April 3, 2023 No Comments READ MORE +

Which aspect of a SaaS application requires compliance with local organizational security policies?

Which aspect of a SaaS application requires compliance with local organizational security policies?A . Types of physical storage media used B. Data-at-rest encryption standards C. Acceptable use of the SaaS application D. Vulnerability scanning and managementView AnswerAnswer: C

April 3, 2023 No Comments READ MORE +

When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)

When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)A . decrypt the infected file using base64 B. alert system administrators C. quarantine the infected file D. delete the infected file E. remove the infected file’s extensionView AnswerAnswer: C,D,E

October 10, 2022 No Comments READ MORE +

Which element of the security operations process is concerned with using external functions to help achieve goals?

Which element of the security operations process is concerned with using external functions to help achieve goals?A . interfaces B. business C. technology D. peopleView AnswerAnswer: A Explanation: The six pillars include:

October 10, 2022 No Comments READ MORE +

Match each description to a Security Operating Platform key capability

DRAG DROP Match each description to a Security Operating Platform key capability. View AnswerAnswer: Explanation: Reduce the attack surface: Best-of-breed technologies that are natively integrated provide a prevention architecture that inherently reduces the attack surface. This type of architecture allows organizations to exert positive control based on applications, users, and...

October 10, 2022 No Comments READ MORE +

What is the key to “taking down” a botnet?

What is the key to “taking down” a botnet?A . prevent bots from communicating with the C2 B. install openvas software on endpoints C. use LDAP as a directory service D. block Docker engine software on endpointsView AnswerAnswer: A

October 10, 2022 No Comments READ MORE +