Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is used to orchestrate, coordinate, and control clusters of containers?

A.

Kubernetes

B.

Prisma Saas

C.

Docker

D.

CN-Series

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?

A.

XDR

B.

STEP

C.

SOAR

D.

SIEM

Organizations that transmit, process, or store payment-card information must comply with what standard?

A.

HIPAA

B.

CISA

C.

GDPR

D.

PCI DSS

What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?

A.

Allow downloads to managed devices but block them from unmanaged devices.

B.

Allow downloads to both managed and unmanaged devices.

C.

Leave data security in the hands of the cloud service provider.

D.

Allow users to choose their own applications to access data.

Match the Identity and Access Management (IAM) security control with the appropriate definition.

A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?

A.

whaling

B.

phishing

C.

pharming

D.

spam

How does Prisma SaaS provide protection for Sanctioned SaaS applications?

A.

Prisma SaaS connects to an organizations internal print and file sharing services to provide protection and sharing visibility

B.

Prisma SaaS does not provide protection for Sanctioned SaaS applications because they are secure

C.

Prisma access uses Uniform Resource Locator (URL) Web categorization to provide protection and sharing visibility

D.

Prisma SaaS connects directly to sanctioned external service providers SaaS application service to provide protection and sharing visibility

Which statement is true about advanced persistent threats?

A.

They use script kiddies to carry out their attacks.

B.

They have the skills and resources to launch additional attacks.

C.

They lack the financial resources to fund their activities.

D.

They typically attack only once.

Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?

A.

Department of Homeland Security

B.

MITRE

C.

Office of Cyber Security and Information Assurance

D.

Cybersecurity Vulnerability Research Center

From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?

A.

Unit 52

B.

PAN-DB

C.

BrightCloud

D.

MineMeld