New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

On which security principle does virtualization have positive effects?

A.

integrity

B.

confidentiality

C.

availability

D.

non-repudiation

You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.

What deployment options do you have available? (Choose two.)

A.

PA-Series

B.

VM-Series

C.

Panorama

D.

CN-Series

Which aspect of a SaaS application requires compliance with local organizational security policies?

A.

Types of physical storage media used

B.

Data-at-rest encryption standards

C.

Acceptable use of the SaaS application

D.

Vulnerability scanning and management

Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)

A.

Detection of threats using data analysis

B.

Automation of security deployments

C.

Ingestion of log data

D.

Prevention of cvbersecurity attacks

Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?

A.

Advanced malware

B.

Smishing

C.

Reconnaissance

D.

Denial of service

Which two network resources does a directory service database contain? (Choose two.)

A.

Services

B.

/etc/shadow files

C.

Users

D.

Terminal shell types on endpoints

In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?

A.

False-positive

B.

True-negative

C.

False-negative

D.

True-positive

What is the purpose of SIEM?

A.

Securing cloud-based applications

B.

Automating the security team’s incident response

C.

Real-time monitoring and analysis of security events

D.

Filtering webpages employees are allowed to access

What type of address translation does a NAT perform?

A.

Private to public

B.

Logical to physical

C.

Physical Io logical

D.

Public to private

Which of the following is a Routed Protocol?

A.

Routing Information Protocol (RIP)

B.

Transmission Control Protocol (TCP)

C.

Internet Protocol (IP)

D.

Domain Name Service (DNS)