With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
Which capability does Cloud Security Posture Management (CSPM) provide for threat detection within Prisma Cloud?
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
What are three benefits of the cloud native security platform? (Choose three.)
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?
Which type of system collects data and uses correlation rules to trigger alarms?
Which component of cloud security is used to identify misconfigurations during the development process?
Which type of portable architecture can package software with dependencies in an isolated unit?
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
Which SOAR feature coordinates across technologies, security teams, and external users for centralized data visibility and action?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Which endpoint protection security option can prevent malware from executing software?
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
Which tool supercharges security operations center (SOC) efficiency with the world’s most comprehensive operating platform for enterprise security?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?
During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)
In a traditional data center what is one result of sequential traffic analysis?
Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?
Which type of malware takes advantage of a vulnerability on an endpoint or server?
Which two network resources does a directory service database contain? (Choose two.)
Which product from Palo Alto Networks enables organizations to prevent successful cyberattacks as well as simplify and strengthen security processes?
Which element of the security operations process is concerned with using external functions to help achieve goals?
A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.
Which NIST cloud service model is this?
Which endpoint product from Palo Alto Networks can help with SOC visibility?
Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?