New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What role do containers play in cloud migration and application management strategies?

A.

They enable companies to use cloud-native tools and methodologies.

B.

They are used for data storage in cloud environments.

C.

They serve as a template manager for software applications and services.

D.

They are used to orchestrate virtual machines (VMs) in cloud environments.

Which IoT connectivity technology is provided by satellites?

A.

4G/LTE

B.

VLF

C.

L-band

D.

2G/2.5G

Which component of the AAA framework verifies user identities so they may access the network?

A.

Allowance

B.

Authorization

C.

Accounting

D.

Authentication

What are two capabilities of identity threat detection and response (ITDR)? (Choose two.)

A.

Securing individual devices

B.

Matching risks to signatures

C.

Scanning for excessive logins

D.

Analyzing access management logs

Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?

A.

You may have to use port numbers greater than 1024 for your business-critical applications.

B.

You may have to open up multiple ports and these ports could also be used to gain unauthorized entry into your datacenter.

C.

You may not be able to assign the correct port to your business-critical applications.

D.

You may not be able to open up enough ports for your business-critical applications which will increase the attack surface area.

On an endpoint, which method should you use to secure applications against exploits?

A.

endpoint-based firewall

B.

strong user passwords

C.

full-disk encryption

D.

software patches

What differentiates SOAR from SIEM?

A.

SOAR platforms focus on analyzing network traffic.

B.

SOAR platforms integrate automated response into the investigation process.

C.

SOAR platforms collect data and send alerts.

D.

SOAR platforms filter alerts with their broader coverage of security incidents.

Which two network resources does a directory service database contain? (Choose two.)

A.

Services

B.

/etc/shadow files

C.

Users

D.

Terminal shell types on endpoints

Which tool supercharges security operations center (SOC) efficiency with the world’s most comprehensive operating platform for enterprise security?

A.

Prisma SAAS

B.

WildFire

C.

Cortex XDR

D.

Cortex XSOAR

Which two statements apply to SaaS financial botnets? (Choose two.)

A.

They are larger than spamming or DDoS botnets.

B.

They are sold as kits that allow attackers to license the code.

C.

They are a defense against spam attacks.

D.

They are used by attackers to build their own botnets.