Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
A. XDR
B. STEP
C. SOAR
D. SIEM
What is the key to "taking down" a botnet?
A. prevent bots from communicating with the C2
B. install openvas software on endpoints
C. use LDAP as a directory service
D. block Docker engine software on endpoints
A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.
Which NIST cloud service model is this?
A. IaaS
B. SaaS
C. PaaS
D. CaaS
In SecOps, what are two of the components included in the identify stage? (Choose two.)
A. Initial Research
B. Change Control
C. Content Engineering
D. Breach Response
Which option is a Prisma Access security service?
A. Compute Security
B. Firewall as a Service (FWaaS)
C. Virtual Private Networks (VPNs)
D. Software-defined wide-area networks (SD-WANs)
In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?
A. False-positive
B. True-negative
C. False-negative
D. True-positive
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
A. Knowledge-based
B. Signature-based
C. Behavior-based
D. Database-based
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
A. DevSecOps improves pipeline security by assigning the security team as the lead team for continuous deployment
B. DevSecOps ensures the pipeline has horizontal intersections for application code deployment
C. DevSecOps unites the Security team with the Development and Operations teams to integrate security into the CI/CD pipeline
D. DevSecOps does security checking after the application code has been processed through the CI/CD pipeline
Which type of malware replicates itself to spread rapidly through a computer network?
A. ransomware
B. Trojan horse
C. virus
D. worm