What are two advantages of security orchestration, automation, and response (SOAR)? (Choose two.)
Scripting of manual tasks -- SOAR platforms automate repetitive, manual security tasks through playbooks and scripting, improving response time and efficiency.
Consistent incident handling -- SOAR ensures that incidents are managed in a standardized and repeatable manner, reducing errors and improving compliance.
Isolated system and log retention are not core advantages of SOAR.
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
Detection of threats using data analysis -- SIEM platforms analyze collected data to identify suspicious patterns and detect threats.
Ingestion of log data -- SIEM systems collect and centralize log data from various sources, which is essential for analysis, correlation, and alerting.
Automation and prevention are more aligned with SOAR and firewall/EDR functionalities, not the core operations of SIEM.
What are two common lifecycle stages for an advanced persistent threat (APT) that is infiltrating a network? (Choose two.)
Lateral movement is a key stage where the attacker moves across the network to find valuable targets.
Privilege escalation involves gaining higher access rights to expand control within the compromised environment.
Communication with covert channels is a tactic used during persistence or exfiltration, while deletion of critical data is not a standard APT lifecycle stage --- it's more characteristic of destructive attacks.
What are two functions of User and Entity Behavior Analytics (UEBA) data in Prisma Cloud CSPM? (Choose two.)
Assessing severity levels -- UEBA data helps prioritize incidents by evaluating the risk and severity based on user and entity behavior.
Detecting and correlating anomalies -- UEBA continuously analyzes activity to identify abnormal behavior and correlate anomalies that may indicate insider threats or compromised accounts.
Which security function enables a firewall to validate the operating system version of a device before granting it network access?
Host Intrusion Prevention Systems (HIPS) operate on endpoints to enforce security policies by monitoring system calls, file integrity, and configuration settings. HIPS can validate device compliance, including operating system versions and patch levels, before permitting network access. This capability prevents vulnerable or outdated devices from becoming attack vectors. Palo Alto Networks integrates HIPS functionalities in its endpoint security solutions, providing granular control to enforce organizational security standards and reduce risk from non-compliant endpoints. Unlike network-based inspection, HIPS works locally on hosts to stop threats at their origin.
Sharee
10 days agoAlberta
17 days agoMarjory
25 days agoErasmo
1 month agoSarah
1 month agoKassandra
2 months agoNoelia
2 months agoCordelia
2 months agoRonald
2 months agoShenika
3 months agoNorah
3 months agoSheron
3 months agoJoye
3 months agoFrance
4 months agoMarshall
4 months agoSolange
4 months agoFrance
4 months agoCarole
5 months agoAlona
5 months agoLynelle
5 months agoKallie
5 months agoWava
6 months agoKyoko
6 months agoTherese
6 months agoCheryll
6 months agoBrande
7 months agoLonny
7 months agoHortencia
7 months agoMayra
7 months agoHildred
7 months ago