What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
What type of attack redirects the traffic of a legitimate website to a fake website?
What are the two most prominent characteristics of the malware type rootkit? (Choose two.)
In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?