DRAG DROP
Match the Identity and Access Management (IAM) security control with the appropriate definition.
Select and Place:
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?
A. MineMeld
B. AutoFocus
C. WildFire
D. Cortex XDR
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?
A. NetOps
B. SecOps
C. SecDevOps
D. DevOps
Which two network resources does a directory service database contain? (Choose two.)
A. Services
B. /etc/shadow files
C. Users
D. Terminal shell types on endpoints
Which pillar of Prisma Cloud application security does vulnerability management fall under?
A. dynamic computing
B. identity security
C. compute security
D. network protection
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
A. Knowledge-based
B. Signature-based
C. Behavior-based
D. Database-based
Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?
A. Shortest Path
B. Hop Count
C. Split Horizon
D. Path Vector
What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?
A. requires the use of only one cloud service provider
B. enables on-demand network services
C. requires the use of two or more cloud service providers
D. defines any network service
Which core component is used to implement a Zero Trust architecture?
A. VPN Concentrator
B. Content Identification
C. Segmentation Platform
D. Web Application Zone
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
A. Global Protect
B. WildFire
C. AutoFocus
D. STIX