DRAG DROP
Match the description with the VPN technology.
Select and Place:
From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?
A. Unit 52
B. PAN-DB
C. BrightCloud
D. MineMeld
Which aspect of a SaaS application requires compliance with local organizational security policies?
A. Types of physical storage media used
B. Data-at-rest encryption standards
C. Acceptable use of the SaaS application
D. Vulnerability scanning and management
Which type of LAN technology is being displayed in the diagram?
A. Star Topology
B. Spine Leaf Topology
C. Mesh Topology
D. Bus Topology
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
A. IaaS
B. SaaS
C. PaaS
D. CaaS
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
A. operating system patches
B. full-disk encryption
C. periodic data backups
D. endpoint-based firewall
Which option is an example of a North-South traffic flow?
A. Lateral movement within a cloud or data center
B. An internal three-tier application
C. Client-server interactions that cross the edge perimeter
D. Traffic between an internal server and internal user
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
A. endpoint antivirus software
B. strong endpoint passwords
C. endpoint disk encryption
D. endpoint NIC ACLs
Which two network resources does a directory service database contain? (Choose two.)
A. Services
B. /etc/shadow files
C. Users
D. Terminal shell types on endpoints
SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)
A. People
B. Accessibility
C. Processes
D. Understanding
E. Business
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
A. Network
B. Management
C. Cloud
D. Security
What is a key advantage and key risk in using a public cloud environment?
A. Multi-tenancy
B. Dedicated Networks
C. Dedicated Hosts
D. Multiplexing
Which endpoint product from Palo Alto Networks can help with SOC visibility?
A. STIX
B. Cortex XDR
C. WildFire
D. AutoFocus
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?
A. Expedition
B. Cortex XDR
C. AutoFocus
D. App-ID
Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?
A. Shortest Path
B. Hop Count
C. Split Horizon
D. Path Vector