Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which component of cloud security is used to identify misconfigurations during the development process?

A.

Container security

B.

SaaS security

C.

Code security

D.

Network security

What type of attack redirects the traffic of a legitimate website to a fake website?

A.

Watering hole

B.

Pharming

C.

Spear phishing

D.

Whaling

Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)

A.

Hardware procurement

B.

Log normalization

C.

Initial security team training

D.

Incident response

What are two examples of an attacker using social engineering? (Choose two.)

A.

Convincing an employee that they are also an employee

B.

Leveraging open-source intelligence to gather information about a high-level executive

C.

Acting as a company representative and asking for personal information not relevant to the reason for their call

D.

Compromising a website and configuring it to automatically install malicious files onto systems that visit the page

What is an advantage of virtual firewalls over physical firewalls for internal segmentation when placed in a data center?

A.

They are dynamically scalable.

B.

They possess unlimited throughput capability.

C.

They are able to prevent evasive threats.

D.

They have failover capability.

What is an event-driven snippet of code that runs on managed infrastructure?

A.

API

B.

Serverless function

C.

Hypervisor

D.

Docker container

Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?

A.

Setting up a web page for harvesting user credentials

B.

Laterally transferring the file through a network after being granted access

C.

Embedding the file inside a pdf to be downloaded and installed

D.

Corruption of security device memory spaces while file is in transit

Which service is encompassed by serverless architecture?

A.

Infrastructure as a Service (laaS)

B.

Function as a Service (FaaS)

C.

Security as a Service (SaaS)

D.

Authentication as a Service

An administrator finds multiple gambling websites in the network traffic log.

What can be created to dynamically block these websites?

A.

URL category

B.

Custom signatures

C.

Decryption policy

D.

Application group

Which two descriptions apply to an XDR solution? (Choose two.)

A.

It employs machine learning (ML) to identity threats.

B.

It is designed for reporting on key metrics for cloud environments.

C.

It ingests data from a wide spectrum of sources.

D.

It is focused on single-vector attacks on specific layers of defense.