Question 16

In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
  • Question 17

    Which type of Wi-Fi attack depends on the victim initiating the connection?
  • Question 18

    Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?
  • Question 19

    An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
    Requirements for the three subnets: Subnet 1: 3 host addresses
    Subnet 2: 25 host addresses
    Subnet 3: 120 host addresses
  • Question 20

    SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)