Which statement describes a host-based intrusion prevention system (HIPS)?
Answer : D
A Host-Based Intrusion Prevention System (HIPS) is installed directly on an endpoint device (such as a server or workstation) and monitors local system activity, including processes, file access, and system calls, to detect and prevent malicious behavior.
Which term describes establishment of on-premises software on a cloud-based server?
Answer : C
Cloud-hosted refers to the deployment of traditional on-premises software on cloud-based servers. This approach allows organizations to run their applications in the cloud without re-architecting them for cloud-native environments.
What is the function of an endpoint detection and response (EDR) tool?
Answer : C
Endpoint Detection and Response (EDR) tools monitor, record, and analyze endpoint activity to detect suspicious behavior, investigate incidents, and respond to threats on user devices such as laptops and desktops.
Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?
Answer : D
Xpanse is a tool from Palo Alto Networks that provides attack surface management by analyzing exposed services and internet-facing assets, giving security operations teams visibility into environmental risks and helping prioritize remediation of vulnerabilities.
Which component of the AAA framework regulates user access and permissions to resources?
Answer : A
Authorization is the component of the AAA (Authentication, Authorization, and Accounting) framework that regulates user access and permissions to resources after identity has been verified. It determines what actions or resources a user is allowed to access.
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
Answer : A
URL categories classify websites based on content type or risk, enabling dynamic policy enforcement such as blocking or allowing access. Administrators can create custom URL categories to group sites like gambling domains and apply blocking rules across the firewall infrastructure. Palo Alto Networks firewalls leverage URL categorization combined with threat intelligence to provide granular web filtering, reducing exposure to malicious or unwanted sites. This dynamic grouping approach is more manageable and scalable than creating individual signatures or static lists and allows for automated policy application aligned with organizational compliance requirements.
Which tool automates remediation of a confirmed cybersecurity breach?
Answer : C
Security Orchestration, Automation, and Response (SOAR) platforms are designed to automate the remediation of confirmed cybersecurity breaches by executing predefined response playbooks, reducing response time and manual effort during incidents.