Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What are two functions of User and Entity Behavior Analytics (UEBA) data in Prisma Cloud CSPM? (Choose two.)

A.

Assessing severity levels

B.

Identifying misconfigurations

C.

Unifying cloud provider services

D.

Detecting and correlating anomalies

Which technology grants enhanced visibility and threat prevention locally on a device?

A.

EDR

B.

IDS

C.

SIEM

D.

DLP

What is an operation of an Attack Surface Management (ASM) platform?

A.

It scans assets in the cloud space for remediation of compromised sanctioned SaaS applications.

B.

It continuously identifies all internal and external internet-connected assets for potential attack vectors and exposures.

C.

It identifies and monitors the movement of data within, into, and out of an organization's network.

D.

It detects and remediates misconfigured security settings in sanctioned SaaS applications through monitoring.

Which action is unique to the security orchestration, automation, and response (SOAR) platforms?

A.

Prioritizing alerts

B.

Enhancing data collection

C.

Usingpredefined workflows

D.

Correlating incident data

Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?

A.

DDoS

B.

DNS tunneling

C.

Command-and-control (C2)

D.

Port evasion

What are two common lifecycle stages for an advanced persistent threat (APT) that is infiltrating a network? (Choose two.)

A.

Lateral movement

B.

Communication with covert channels

C.

Deletion of critical data

D.

Privilege escalation

Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?

A.

IIDP

B.

IAM

C.

SIM

D.

Xpanse

Which capability does Cloud Security Posture Management (CSPM) provide for threat detection within Prisma Cloud?

A.

Real-time protection from threats

B.

Alerts for new code introduction

C.

Integration with threat feeds

D.

Continuous monitoring of resources

Which statement describes advanced malware?

A.

It operates openly and can be detected by traditional antivirus.

B.

It lacks the ability to exfiltrate data or persist within a system.

C.

It is designed to avoid detection and adapt.

D.

It can operate without consuming resources.

Which type of system is a user entity behavior analysis (UEBA) tool?

A.

Correlating

B.

Active monitoring

C.

Archiving

D.

sandboxing