Discovers threats by identifying activity that deviates from a normal baseline correct answers User Entity Behavior Analytics
Access Management secures and manages the relationships between users and resources correct answers True
Machine Identity decouples workload ______ from IP addresses c...
Kahoot PCEET || A Verified A+ Pass.
Discovers threats by identifying activity that deviates from a normal baseline correct answers
User Entity Behavior Analytics
Access Management secures and manages the relationships between users and resources correct
answers True
Machine Identity decouples workload ______ from IP addresses correct answers Identity
On an endpoint, which method should you use to secure applications against exploits? correct
answers Endpoint-based firewall
Which non-profit maintains the common vulnerability exposure catalog that is available on their
public website? correct answers MITRE
Which Palo tool enables a proactive, prevention-based approach to network automation that
accelerates security analysis? correct answers Cortex XDR
Which activities do local organization security policies cover for a SaaS application? correct
answers how the application can be used
Which Palo Alto Networks product provides playbooks with 300+ vendor integrations that help
solve any security use case? correct answers Cortex XSOAR
A native hypervisor runs: correct answers directly on the host computer's hardware
Which key component is used to configure a static route? correct answers next hop IP address
Which TCP/IP sub-protocol operates at the Layer 7 of the OSI model? correct answers SNMP
Uploading the application code itself, without having to provision a full container image or OS
virtual machine correct answers Serverless
Which VPN technology was developed by Cisco and supports some protocols inside point-to-
point links? correct answers Generic Routing Encapsulation (GRE)
Which VPN technology is supported by most OSes and provides no encryption by itself? correct
answers Layer 2 Tunneling Protocol (L2TP)
Which VPN technology uses Internet Key Exchange (IKE) to start a connection? correct answers
Layer 2 Tunneling Protocol (L2TP)
Which VPN technology is primarily used for secure remote client VPN instead of site-to-site
VPN tunnels correct answers Secure Socket Tunneling Protocol (SSTP)
, Provides access to the global threat intelligence and attack context to help analysis, forensics,
and hunting workflows? correct answers AutoFocus
What is the primary security focus after consolidating data center hypervisor hosts within trust
levels? correct answers using physical network security appliances
Which technique changes protocols at random during a session? correct answers port hopping
Which endpoint product from Palo Alto Networks can help with SOC visibility? correct answers
Cortex XDR
Which WildFire analysis detonates an unknown submission in a custom virtual environment to
find effects and behavior? correct answers Dynamic
Which subscription complements App-ID and allows you to protect against websites hosting
malware and phishing pages? correct answers URL Filtering
Which option would be an example of PII that you need to prevent from leaving your enterprise
network? correct answers credit card number
Which network analysis tool can be used to record packet captures? correct answers wireshark
Used to accelerate incident response through use of automated playbooks with security tools and
other data flows. correct answers SOAR
Palo product used to prevent endpoint systems from running malware executables such as
viruses, trojans, and rootkits? correct answers XDR
What does SIEM stand for? correct answers Security Information and Event Management
Which IoT connectivity uses low-power, short range wireless communication for P2P connection
in hub and spoke topology? correct answers Bluetooth Low Energy (BLE)
Which IoT connectivity uses a wireless protocol defined by IEEE with various designations like
a, b, g, n, ac, ax, 6? correct answers 802.11
Which IoT connectivity uses a proprietary multicast wireless sensor network tech primarily for
wearables? correct answers Adaptive Network Technology (ANT+)
Which IoT connectivity uses a low-energy wireless mesh network protocol primarily for home
automation? correct answers Z-Wave
Which type of Wi-Fi attack depends on the victim initiating the connection? correct answers
Jasager
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller FullyFocus. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.69. You're not tied to anything after your purchase.