Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
Which IPsec feature allows device traffic to go directly to the Internet?
Which core component is used to implement a Zero Trust architecture?
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?
What is a key advantage and key risk in using a public cloud environment?
Which statement describes DevOps?
Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?
What is the recommended method for collecting security logs from multiple endpoints?
Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
Which endpoint product from Palo Alto Networks can help with SOC visibility?
Which IoT connectivity technology is provided by satellites?
Which TCP/IP sub-protocol operates at the Layer7 of the OSI model?
What does “forensics” refer to in a Security Operations process?
In a traditional data center what is one result of sequential traffic analysis?
The seventy of an attack needs to be escalated.
What needs to be in place in order for the security operations team to properly inform various units within the enterprise of the issue?
An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
Requirements for the three subnets: Subnet 1: 3 host addresses
Subnet 2: 25 host addresses
Subnet 3: 120 host addresses
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?
Match the description with the VPN technology.
From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?
Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
What is the purpose of SIEM?
Which method is used to exploit vulnerabilities, services, and applications?
In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?
Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?
How does Prisma SaaS provide protection for Sanctioned SaaS applications?
What are three benefits of the cloud native security platform? (Choose three.)
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.
What deployment options do you have available? (Choose two.)
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
Web 2.0 applications provide which type of service?
Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?
Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?
What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?
Match the Identity and Access Management (IAM) security control with the appropriate definition.
On an endpoint, which method should you use to secure applications against exploits?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)
Match each tunneling protocol to its definition.
What are two disadvantages of Static Rout ng? (Choose two.)
Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?
Match the Palo Alto Networks WildFire analysis verdict with its definition.
Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Which type of LAN technology is being displayed in the diagram?
What is the definition of a zero-day threat?