Which core component is used to implement a Zero Trust architecture?
Answer : C
'Remember that a trust zone is not intended to be a ''pocket of trust'' where systems (and therefore threats) within the zone can communicate freely and directly with each other. For a full Zero Trust implementation, the network would be configured to ensure that all communications traffic, including traffic between devices in the same zone, is intermediated by the corresponding Zero Trust Segmentation Platform.'
What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?
Which characteristic of serverless computing enables developers to quickly deploy application code?
Answer : B
'In serverless apps, the developer uploads only the app package itself, without a full container image or any OS components. The platform dynamically packages it into an image, runs the image in a container, and (if needed) instantiates the underlying host OS and VM and the hardware required to run them.'
In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)
How does Prisma SaaS provide protection for Sanctioned SaaS applications?
Answer : D
Prisma SaaS connects directly to the applications themselves, therefore providing continuous silent monitoring of the risks within the sanctioned SaaS applications, with detailed visibility that is not possible with traditional security solutions.
Which aspect of a SaaS application requires compliance with local organizational security policies?