When does a TLS handshake occur?
Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?
What is required for an effective Attack Surface Management (ASM) process?
Which type of system collects data and uses correlation rules to trigger alarms?
Which term describes establishment of on-premises software on a cloud-based server?
What is a function of SSL/TLS decryption?
What are two limitations of signature-based anti-malware software? (Choose two.)
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
What type of attack redirects the traffic of a legitimate website to a fake website?
Which component of cloud security is used to identify misconfigurations during the development process?
Which feature of cloud-native security platforms (CNSPs) focuses on protecting virtual machine (VM), container, and serverless deployments against application-level attacks during runtime?
Which type of attack includes exfiltration of data as a primary objective?
Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?
Which endpoint protection security option can prevent malware from executing software?
What are two functions of an active monitoring system? (Choose two.)
What is a reason IoT devices are more susceptible to command-and-control (C2) attacks?
What is a dependency for the functionality of signature-based malware detection?
Which tool automates remediation of a confirmed cybersecurity breach?
Which characteristic of advanced malware makes it difficult to detect?