Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
Which action is unique to the security orchestration, automation, and response (SOAR) platforms?
Which capability does Cloud Security Posture Management (CSPM) provide for threat detection within Prisma Cloud?
Which component of the AAA framework verifies user identities so they may access the network?
What is a reason IoT devices are more susceptible to command-and-control (C2) attacks?
Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?
Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)
Which technology secures software-as-a-service (SaaS) applications and network data, and also enforces compliance policies for application access?
What are two characteristics of an advanced persistent threat (APT)? (Choose two.)
What type of attack redirects the traffic of a legitimate website to a fake website?
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?