At which layer of the OSI model are routing protocols defined?
In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?
Which option is a Prisma Access security service?
You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.
What deployment options do you have available? (Choose two.)
Match the Palo Alto Networks WildFire analysis verdict with its definition.
Which IoT connectivity technology is provided by satellites?
In a traditional data center what is one result of sequential traffic analysis?
Which native Windows application can be used to inspect actions taken at a specific time?
What is the purpose of SIEM?
What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?
Match each description to a Security Operating Platform key capability.
How does Prisma SaaS provide protection for Sanctioned SaaS applications?
How can local systems eliminate vulnerabilities?
On which security principle does virtualization have positive effects?
From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?
Which network device breaks networks into separate broadcast domains?
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
Which network firewall primarily filters traffic based on source and destination IP address?
What is the key to “taking down” a botnet?
Web 2.0 applications provide which type of service?
What are the two most prominent characteristics of the malware type rootkit? (Choose two.)
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?
If an endpoint does not know how to reach its destination, what path will it take to get there?
What are two key characteristics of a Type 1 hypervisor? (Choose two.)
What should a security operations engineer do if they are presented with an encoded string during an incident investigation?
Match the IoT connectivity description with the technology.
Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?
What is the recommended method for collecting security logs from multiple endpoints?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
What are two disadvantages of Static Rout ng? (Choose two.)
Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
Which tool supercharges security operations center (SOC) efficiency with the world’s most comprehensive operating platform for enterprise security?
What protocol requires all routers in the same domain to maintain a map of the network?
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
Which aspect of a SaaS application requires compliance with local organizational security policies?
Which TCP/IP sub-protocol operates at the Layer7 of the OSI model?
The seventy of an attack needs to be escalated.
What needs to be in place in order for the security operations team to properly inform various units within the enterprise of the issue?
A native hypervisor runs:
Which of the following is an AWS serverless service?
What are three benefits of SD-WAN infrastructure? (Choose three.)
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?