Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which component of cloud security is used to identify misconfigurations during the development process?

A.

Container security

B.

SaaS security

C.

Code security

D.

Network security

Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?

A.

API

B.

Code security

C.

Virtualization

D.

IRP

What is a dependency for the functionality of signature-based malware detection?

A.

Frequent database updates

B.

Support of a DLP device

C.

API integration with a sandbox

D.

Enabling quality of service

Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?

A.

DNS security

B.

Advanced WildFire

C.

loT security

D.

Advanced Threat Prevention

Which security tool provides policy enforcement for mobile users and remote networks?

A.

Service connection

B.

Prisma Access

C.

Prisma Cloud

D.

Digital experience management

Which product functions as part of a SASE solution?

A.

Cortex

B.

Prisma Cloud

C.

Kubernetes

D.

Prisma SD-WAN

What is the function of an endpoint detection and response (EDR) tool?

A.

To provide organizations with expertise for monitoring network devices

B.

To ingest alert data from network devices

C.

To monitor activities and behaviors for investigation of security incidents on user devices

D.

To integrate data from different products in order to provide a holistic view of security posture

What is a function of SSL/TLS decryption?

A.

It applies to unknown threat detection only.

B.

It reveals malware within web-based traffic.

C.

It protects users from social engineering.

D.

It identifies loT devices on the internet.

Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?

A.

Advanced malware

B.

Smishing

C.

Reconnaissance

D.

Denial of service

What is an operation of an Attack Surface Management (ASM) platform?

A.

It scans assets in the cloud space for remediation of compromised sanctioned SaaS applications.

B.

It continuously identifies all internal and external internet-connected assets for potential attack vectors and exposures.

C.

It identifies and monitors the movement of data within, into, and out of an organization's network.

D.

It detects and remediates misconfigured security settings in sanctioned SaaS applications through monitoring.