An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?
What is an event-driven snippet of code that runs on managed infrastructure?
Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)
Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?
What is required for an effective Attack Surface Management (ASM) process?
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
When does a TLS handshake occur?
Which feature is part of an intrusion prevention system (IPS)?
Which security tool provides policy enforcement for mobile users and remote networks?