Pass the Paloalto Networks Certified Cybersecurity Associate PCCET Questions and answers with CertsForce

Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions
Questions # 11:

What are three benefits of SD-WAN infrastructure? (Choose three.)

Options:

A.

Improving performance of SaaS applications by requiring all traffic to be back-hauled through the corporate headquarters network


B.

Promoting simplicity through the utilization of a centralized management structure


C.

Utilizing zero-touch provisioning for automated deployments


D.

Leveraging remote site routing technical support by relying on MPLS


E.

Improving performance by allowing efficient access to cloud-based resources without requiring back-haul traffic to a centralized location


Expert Solution
Questions # 12:

Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?

Options:

A.

User-ID


B.

Lightweight Directory Access Protocol (LDAP)


C.

User and Entity Behavior Analytics (UEBA)


D.

Identity and Access Management (IAM)


Expert Solution
Questions # 13:

What are the two most prominent characteristics of the malware type rootkit? (Choose two.)

Options:

A.

It encrypts user data.


B.

It cannot be detected by antivirus because of its masking techniques.


C.

It takes control of the operating system.


D.

It steals personal information.


Expert Solution
Questions # 14:

Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?

Options:

A.

Knowledge-based


B.

Signature-based


C.

Behavior-based


D.

Database-based


Expert Solution
Questions # 15:

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?

Options:

A.

Expedition


B.

Cortex XDR


C.

AutoFocus


D.

App-ID


Expert Solution
Questions # 16:

Under which category does an application that is approved by the IT department, such as Office 365, fall?

Options:

A.

unsanctioned


B.

prohibited


C.

tolerated


D.

sanctioned


Expert Solution
Questions # 17:

In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?

Options:

A.

the network is large


B.

the network is small


C.

the network has low bandwidth requirements


D.

the network needs backup routes


Expert Solution
Questions # 18:

In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?

Options:

A.

exploitation


B.

actions on the objective


C.

command and control


D.

installation


Expert Solution
Questions # 19:

Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?

Options:

A.

Threat Prevention


B.

DNS Security


C.

WildFire


D.

URL Filtering


Expert Solution
Questions # 20:

Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?

Options:

A.

Use of non-standard ports


B.

Hiding within SSL encryption


C.

Port hopping


D.

Tunneling within commonly used services


Expert Solution
Viewing page 2 out of 5 pages
Viewing questions 11-20 out of questions