Which component of cloud security is used to identify misconfigurations during the development process?
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
What is a dependency for the functionality of signature-based malware detection?
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
Which security tool provides policy enforcement for mobile users and remote networks?
Which product functions as part of a SASE solution?
What is the function of an endpoint detection and response (EDR) tool?
What is a function of SSL/TLS decryption?
Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?
What is an operation of an Attack Surface Management (ASM) platform?