In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?
Answer : A
A static routing protocol requires that routes be created and updated manually on a router or other network device. If a static route is down, traffic can't be automatically rerouted unless an alternate route has been configured. Also, if the route is congested, traffic can't be automatically rerouted over the less congested alternate route. Static routing is practical only in very small networks or for very limited, special-case routing scenarios (for example, a destination that's used as a backup route or is reachable only via a single router). However, static routing has low bandwidth requirements (routing information isn't broadcast across the network) and some built-in security (users can route only to destinations that are specified in statically defined routes).
Which aspect of a SaaS application requires compliance with local organizational security policies?
Which of the following is an AWS serverless service?
Answer : D
Examples of serverless environments include Amazon Lambda and Azure Functions. Many PaaS offerings, such as Pivotal Cloud Foundry, also are effectively serverless even if they have not historically been marketed as such. Although serverless may appear to lack the container-specific, cloud native attribute, containers are extensively used in the underlying implementations, even if those implementations are not exposed to end users directly.
What type of address translation does a NAT perform?
Answer : A
NAT stands for Network Address Translation, which is a process that allows devices on a private network to communicate with devices on a public network, such as the Internet. NAT translates the private IP addresses of the devices on the private network to public IP addresses that can be routed on the public network. This way, multiple devices on the private network can share a single public IP address and access the Internet. NAT also provides security benefits, as it hides the internal network structure and IP addresses from the outside world. Reference: Palo Alto Networks Certified Cybersecurity Entry-level Technician (PCCET), Fundamentals of Network Security, Network Address Translation (NAT)
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?
Answer : C
Command and Control: Attackers establish encrypted communication channels back to command-and-control (C2) servers across the internet so that they can modify their attack objectives and methods as additional targets of opportunity are identified within the victim network, or to evade any new security countermeasures that the organization may attempt to deploy if attack artifacts are discovered.
Which tool supercharges security operations center (SOC) efficiency with the world's most comprehensive operating platform for enterprise security?
Answer : D
Cortex XSOAR enhances Security Operations Center (SOC) efficiency with the world's most comprehensive operating platform for enterprise security. Cortex XSOAR unifies case management, automation, real-time collaboration, and native threat intel management in the industry's first extended security orchestration, automation, and response (SOAR) offering.
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?