A) It analyzes the data from suspicious files to provide a new level of threat intelligence
B) It searches for potential threats based on identified activities and behaviors.
C) It determines the scope and cause of an outbreak and tracks suspicious files
D) It tracks file behavior across the network to see which devices it enters and exits
Correct Answer
verified
Multiple Choice
A) File Reputation
B) Behavioral Indicators of Compromise
C) Global Threat Intelligence
D) Sandboxing File Analysis
Correct Answer
verified
Multiple Choice
A) Anomaly modeling
B) Anomaly detection
C) Event classification
D) Trust modeling
Correct Answer
verified
Multiple Choice
A) Web
B) Cloud
C) Voicemail
D) Data Center
E) Email
Correct Answer
verified
Multiple Choice
A) Rebuild their security portfolios with new solutions
B) Complement threat-centric tactics with trust-centric methods
C) Expand their IT departments
D) Decrease internal access and reporting
E) Reinforce their threat-centric security tactics
Correct Answer
verified
Multiple Choice
A) Threat protection
B) Orchestration
C) Automation
D) Access
E) Visibility
Correct Answer
verified
Multiple Choice
A) Reputation filtering
B) Malware scanning
C) Predictive intelligence
D) Breach mitigation
E) Off-network security
F) Recursive DNS
Correct Answer
verified
Multiple Choice
A) dynamic data analysis
B) intrusion analysis
C) dynamic URL filtering
D) reputation analytics
E) advanced analytics
Correct Answer
verified
Multiple Choice
A) Network Analytics
B) Behavioral Indication of Compromise
C) Remote Access VPN
D) File Retrospection and Trajectory
E) Mobile Access
Correct Answer
verified
Multiple Choice
A) Web
B) Cloud
C) Data Center
D) Email
E) Endpoints
Correct Answer
verified
Multiple Choice
A) 50
B) 30
C) 10
D) 70
Correct Answer
verified
Multiple Choice
A) Live threat intelligence
B) Proxy and file inspection
C) URL filtering
D) Real-time sandboxing
E) Data analytics and monitoring
Correct Answer
verified
Multiple Choice
A) Blocks threats in real time
B) Real-time threat information
C) 3rd party applications integrated through comprehensive APIs
D) Detection of threats communicated within 48 hours of occurrence
Correct Answer
verified
Multiple Choice
A) OT
B) Branches
C) IT
D) Fabric Level
Correct Answer
verified
Multiple Choice
A) Compliance regulations
B) Security system blackouts
C) High turnover of IT professionals
D) Limited resources
E) Lack of solution integration
Correct Answer
verified
Multiple Choice
A) Flexible AAA Options
B) Differentiated Mobile Access
C) High throughput maintained while still protecting domains against threats
D) Identity Service Engine
Correct Answer
verified
Showing 41 - 56 of 56
Related Exams