New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What are three benefits of SD-WAN infrastructure? (Choose three.)

A.

Improving performance of SaaS applications by requiring all traffic to be back-hauled through the corporate headquarters network

B.

Promoting simplicity through the utilization of a centralized management structure

C.

Utilizing zero-touch provisioning for automated deployments

D.

Leveraging remote site routing technical support by relying on MPLS

E.

Improving performance by allowing efficient access to cloud-based resources without requiring back-haul traffic to a centralized location

Which key component is used to configure a static route?

A.

router ID

B.

enable setting

C.

routing protocol

D.

next hop IP address

What are two functions of User and Entity Behavior Analytics (UEBA) data in Prisma Cloud CSPM? (Choose two.)

A.

Assessing severity levels

B.

Identifying misconfigurations

C.

Unifying cloud provider services

D.

Detecting and correlating anomalies

Which technology grants enhanced visibility and threat prevention locally on a device?

A.

EDR

B.

IDS

C.

SIEM

D.

DLP

What does “forensics” refer to in a Security Operations process?

A.

Collecting raw data needed to complete the detailed analysis of an investigation

B.

Validating cyber analysts’ backgrounds before hiring

C.

Reviewing information about a broad range of activities

D.

Analyzing new IDS/IPS platforms for an enterprise

Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?

A.

Use of non-standard ports

B.

Hiding within SSL encryption

C.

Port hopping

D.

Tunneling within commonly used services

A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.

Which type of phishing attack does this represent?

A.

Whaling

B.

Vishing

C.

Pharming

D.

Angler phishing

When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)

A.

decrypt the infected file using base64

B.

alert system administrators

C.

quarantine the infected file

D.

delete the infected file

E.

remove the infected file’s extension

A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?

A.

whaling

B.

phishing

C.

pharming

D.

spam

Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?

A.

DNS Security

B.

URL Filtering

C.

WildFire

D.

Threat Prevention