An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
Which architecture model uses virtual machines (VMs) in a public cloud environment?
Which feature of cloud-native security platforms (CNSPs) focuses on protecting virtual machine (VM), container, and serverless deployments against application-level attacks during runtime?
What is a dependency for the functionality of signature-based malware detection?
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
Which type of attack includes exfiltration of data as a primary objective?
Which component of cloud security is used to identify misconfigurations during the development process?
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.
Which type of phishing attack does this represent?
What type of attack redirects the traffic of a legitimate website to a fake website?
Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?
What are two limitations of signature-based anti-malware software? (Choose two.)