Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which service is encompassed by serverless architecture?

A.

Infrastructure as a Service (laaS)

B.

Function as a Service (FaaS)

C.

Security as a Service (SaaS)

D.

Authentication as a Service

Which feature is part of an intrusion prevention system (IPS)?

A.

API-based coverage of apps

B.

Automated security actions

C.

Protection of data at rest

D.

Real-time web filtering

A firewall administrator needs to efficiently deploy corporate account configurations and VPN settings to targeted mobile devices within the network.

Which technology meets this requirement?

A.

SIEM

B.

MDM

C.

EDR

D.

ADEM

Which statement describes advanced malware?

A.

It operates openly and can be detected by traditional antivirus.

B.

It lacks the ability to exfiltrate data or persist within a system.

C.

It is designed to avoid detection and adapt.

D.

It can operate without consuming resources.

What are two characteristics of an advanced persistent threat (APT)? (Choose two.)

A.

Multiple attack vectors

B.

Repeated pursuit of objective

C.

Reduced interaction time

D.

Tendency to isolate hosts

Which two descriptions apply to an XDR solution? (Choose two.)

A.

It employs machine learning (ML) to identity threats.

B.

It is designed for reporting on key metrics for cloud environments.

C.

It ingests data from a wide spectrum of sources.

D.

It is focused on single-vector attacks on specific layers of defense.

Which endpoint protection security option can prevent malware from executing software?

A.

Application allow list

B.

DNS Security

C.

URL filtering

D.

Dynamic access control

What are two advantages of security orchestration, automation, and response (SOAR)? (Choose two.)

A.

Completely isolated system

B.

Scripting of manual tasks

C.

Consistent incident handling

D.

Long-term retention of logs

Which component of the AAA framework regulates user access and permissions to resources?

A.

Authorization

B.

Allowance

C.

Accounting

D.

Authentication

Which Palo Alto Networks solution has replaced legacy IPS solutions?

A.

Advanced DNS Security

B.

Advanced WildFire

C.

Advanced Threat Prevention

D.

Advanced URL Filtering