Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The customer is responsible only for which type of security when using a SaaS application?

A.

physical

B.

platform

C.

data

D.

infrastructure

Match each description to a Security Operating Platform key capability.

Which element of the security operations process is concerned with using external functions to help achieve goals?

A.

interfaces

B.

business

C.

technology

D.

people

Which architecture model uses virtual machines (VMs) in a public cloud environment?

A.

Kubernetes

B.

Serverless

C.

Docker

D.

Host-based

Which service is encompassed by serverless architecture?

A.

Infrastructure as a Service (laaS)

B.

Function as a Service (FaaS)

C.

Security as a Service (SaaS)

D.

Authentication as a Service

Which Palo Alto Networks solution has replaced legacy IPS solutions?

A.

Advanced DNS Security

B.

Advanced WildFire

C.

Advanced Threat Prevention

D.

Advanced URL Filtering

An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?

Requirements for the three subnets: Subnet 1: 3 host addresses

Subnet 2: 25 host addresses

Subnet 3: 120 host addresses

A.

192.168.6.168/30

B.

192.168.6.0/25

C.

192.168.6.160/29

D.

192.168.6.128/27

Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)

A.

Hardware procurement

B.

Log normalization

C.

Initial security team training

D.

Incident response

Which network analysis tool can be used to record packet captures?

A.

Smart IP Scanner

B.

Wireshark

C.

Angry IP Scanner

D.

Netman

Which of these ports is normally associated with HTTPS?

A.

443

B.

5050

C.

25

D.

80