Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?
A. an intranet-accessed contractor's system that was compromised
B. exploitation of an unpatched security vulnerability
C. access by using a third-party vendor's password
D. a phishing scheme that captured a database administrator's password
In SecOps, what are two of the components included in the identify stage? (Choose two.)
A. Initial Research
B. Change Control
C. Content Engineering
D. Breach Response
Which subnet does the host 192.168.19.36/27 belong?
A. 192.168.19.0
B. 192.168.19.16
C. 192.168.19.64
D. 192.168.19.32
Which endpoint tool or agent can enact behavior-based protection?
A. AutoFocus
B. Cortex XDR
C. DNS Security
D. MineMeld
Under which category does an application that is approved by the IT department, such as Office 365, fall?
A. unsanctioned
B. prohibited
C. tolerated
D. sanctioned
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
A. Network
B. Management
C. Cloud
D. Security
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
A. Credit card number
B. Trade secret
C. National security information
D. A symmetric encryption key
What is a key advantage and key risk in using a public cloud environment?
A. Multi-tenancy
B. Dedicated Networks
C. Dedicated Hosts
D. Multiplexing
Which TCP/IP sub-protocol operates at the Layer7 of the OSI model?
A. UDP
B. MAC
C. SNMP
D. NFS
In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)
A. SaaS
B. PaaS
C. On-premises
D. IaaS