Which activities do local organization security policies cover for a SaaS application?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
What are the two most prominent characteristics of the malware type rootkit? (Choose two.)
Which action must Secunty Operations take when dealing with a known attack?
If an endpoint does not know how to reach its destination, what path will it take to get there?
Given the graphic, match each stage of the cyber-attack lifecycle to its description.
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
Which product from Palo Alto Networks enables organizations to prevent successful cyberattacks as well as simplify and strengthen security processes?
A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?
Which pillar of Prisma Cloud application security does vulnerability management fall under?
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?
Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?
Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
Which option describes the “selective network security virtualization†phase of incrementally transforming data centers?
What is used to orchestrate, coordinate, and control clusters of containers?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?