Question 16

A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at
100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center Which VM instance should be used to secure the network by this customer?
  • Question 17

    A customer has business-critical applications that rely on the general web-browsing application. Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?
  • Question 18

    An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address Which mechanism prevents this connection from succeeding?
  • Question 19

    What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)
  • Question 20

    Which are the three mandatory components needed to run Cortex XDR? (Choose three.)