New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What are two key characteristics of a Type 1 hypervisor? (Choose two.)

A.

is hardened against cyber attacks

B.

runs without any vulnerability issues

C.

runs within an operating system

D.

allows multiple, virtual (or guest) operating systems to run concurrently on a single physical host computer

Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?

A.

Global Protect

B.

WildFire

C.

AutoFocus

D.

STIX

Which network firewall primarily filters traffic based on source and destination IP address?

A.

Proxy

B.

Stateful

C.

Stateless

D.

Application

Match the DNS record type to its function within DNS.

What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?

A.

Allow downloads to managed devices but block them from unmanaged devices.

B.

Allow downloads to both managed and unmanaged devices.

C.

Leave data security in the hands of the cloud service provider.

D.

Allow users to choose their own applications to access data.

Which endpoint product from Palo Alto Networks can help with SOC visibility?

A.

STIX

B.

Cortex XDR

C.

WildFire

D.

AutoFocus

What is a function of SSL/TLS decryption?

A.

It applies to unknown threat detection only.

B.

It reveals malware within web-based traffic.

C.

It protects users from social engineering.

D.

It identifies loT devices on the internet.

What are three benefits of the cloud native security platform? (Choose three.)

A.

Increased throughput

B.

Exclusivity

C.

Agility

D.

Digital transformation

E.

Flexibility

Which characteristic of serverless computing enables developers to quickly deploy application code?

A.

Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand

B.

Uploading the application code itself, without having to provision a full container image or any OS virtual machine components

C.

Using cloud service spot pricing to reduce the cost of using virtual machines to run their application code

D.

Using Container as a Service (CaaS) to deploy application containers to run their code.

Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?

A.

Setting up a web page for harvesting user credentials

B.

Laterally transferring the file through a network after being granted access

C.

Embedding the file inside a pdf to be downloaded and installed

D.

Corruption of security device memory spaces while file is in transit