What are two characteristics of an advanced persistent threat (APT)? (Choose two.)
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
Which capability does Cloud Security Posture Management (CSPM) provide for threat detection within Prisma Cloud?
What are two examples of an attacker using social engineering? (Choose two.)
Which action is unique to the security orchestration, automation, and response (SOAR) platforms?
What is an event-driven snippet of code that runs on managed infrastructure?