Which action is unique to the security orchestration, automation, and response (SOAR) platforms?
Answer : C
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
Answer : AC
Which Palo Alto Networks solution has replaced legacy IPS solutions?
Answer : C
Which type of system is a user entity behavior analysis (UEBA) tool?
Answer : B
What is a function of SSL/TLS decryption?
Answer : B
Which feature is part of an intrusion prevention system (IPS)?
Answer : B
What are two capabilities of identity threat detection and response (ITDR)? (Choose two.)
Answer : CD
Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?
Answer : B
Which service is encompassed by serverless architecture?
Answer : B
Which architecture model uses virtual machines (VMs) in a public cloud environment?
Answer : D
Which two statements apply to SaaS financial botnets? (Choose two.)
Answer : BD
What is an event-driven snippet of code that runs on managed infrastructure?
Answer : B
Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?
Answer : A
What is a dependency for the functionality of signature-based malware detection?
Answer : A
When does a TLS handshake occur?
Answer : C
Have any questions or issues ? Please dont hesitate to contact us