Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?

A.

requires the use of only one cloud service provider

B.

enables on-demand network services

C.

requires the use of two or more cloud service providers

D.

defines any network service

Which option is an example of a North-South traffic flow?

A.

Lateral movement within a cloud or data center

B.

An internal three-tier application

C.

Client-server interactions that cross the edge perimeter

D.

Traffic between an internal server and internal user

Which characteristic of serverless computing enables developers to quickly deploy application code?

A.

Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand

B.

Uploading the application code itself, without having to provision a full container image or any OS virtual machine components

C.

Using cloud service spot pricing to reduce the cost of using virtual machines to run their application code

D.

Using Container as a Service (CaaS) to deploy application containers to run their code.

How does adopting a serverless model impact application development?

A.

costs more to develop application code because it uses more compute resources

B.

slows down the deployment of application code, but it improves the quality of code development

C.

reduces the operational overhead necessary to deploy application code

D.

prevents developers from focusing on just the application code because you need to provision the underlying infrastructure to run the code

Which type of malware replicates itself to spread rapidly through a computer network?

A.

ransomware

B.

Trojan horse

C.

virus

D.

worm

Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?

A.

Benign

B.

Tolerated

C.

Sanctioned

D.

Secure

Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?

A.

3G

B.

Z-wave

C.

802.11ax

D.

C-band

What is the ptrpose of automation in SOAR?

A.

To provide consistency in response to security issues

B.

To give only administrators the ability to view logs

C.

To allow easy manual entry of changes to security templates

D.

To complicate programming for system administration -

You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.

What deployment options do you have available? (Choose two.)

A.

PA-Series

B.

VM-Series

C.

Panorama

D.

CN-Series

Which activities do local organization security policies cover for a SaaS application?

A.

how the data is backed up in one or more locations

B.

how the application can be used

C.

how the application processes the data

D.

how the application can transit the Internet