In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?
A. Computer
B. Switch
C. Infrastructure
D. Cloud
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
A. operating system patches
B. full-disk encryption
C. periodic data backups
D. endpoint-based firewall
Which pillar of Prisma Cloud application security does vulnerability management fall under?
A. dynamic computing
B. identity security
C. compute security
D. network protection
In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?
A. False-positive
B. True-negative
C. False-negative
D. True-positive
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
A. Credit card number
B. Trade secret
C. National security information
D. A symmetric encryption key
Which activities do local organization security policies cover for a SaaS application?
A. how the data is backed up in one or more locations
B. how the application can be used
C. how the application processes the data
D. how the application can transit the Internet
An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
Requirements for the three subnets:
Subnet 1: 3 host addresses
Subnet 2: 25 host addresses
Subnet 3: 120 host addresses
A. 192.168.6.168/30
B. 192.168.6.0/25
C. 192.168.6.160/29
D. 192.168.6.128/27
Which statement describes DevOps?
A. DevOps is its own separate team
B. DevOps is a set of tools that assists the Development and Operations teams throughout the software delivery process
C. DevOps is a combination of the Development and Operations teams
D. DevOps is a culture that unites the Development and Operations teams throughout the software delivery process
Which three services are part of Prisma SaaS? (Choose three.)
A. Data Loss Prevention
B. DevOps
C. Denial of Service
D. Data Exposure Control
E. Threat Prevention
Which product from Palo Alto Networks enables organizations to prevent successful cyberattacks as well as simplify and strengthen security processes?
A. Expedition
B. AutoFocus
C. MineMeld
D. Cortex XDR