Pass the Paloalto Networks Certified Cybersecurity Associate PCCET Questions and answers with CertsForce

Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions
Questions # 21:

Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.

Options:

A.

It cannot identify command-and-control traffic


B.

It assumes that all internal devices are untrusted


C.

It assumes that every internal endpoint can be trusted


D.

It cannot monitor all potential network ports


Expert Solution
Questions # 22:

Which endpoint tool or agent can enact behavior-based protection?

Options:

A.

AutoFocus


B.

Cortex XDR


C.

DNS Security


D.

MineMeld


Expert Solution
Questions # 23:

Which type of malware replicates itself to spread rapidly through a computer network?

Options:

A.

ransomware


B.

Trojan horse


C.

virus


D.

worm


Expert Solution
Questions # 24:

What is the primary security focus after consolidating data center hypervisor hosts within trust levels?

Options:

A.

control and protect inter-host traffic using routers configured to use the Border Gateway Protocol (BGP) dynamic routing protocol


B.

control and protect inter-host traffic by exporting all your traffic logs to a sysvol log server using the User Datagram Protocol (UDP)


C.

control and protect inter-host traffic by using IPv4 addressing


D.

control and protect inter-host traffic using physical network security appliances


Expert Solution
Questions # 25:

Which characteristic of serverless computing enables developers to quickly deploy application code?

Options:

A.

Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand


B.

Uploading the application code itself, without having to provision a full container image or any OS virtual machine components


C.

Using cloud service spot pricing to reduce the cost of using virtual machines to run their application code


D.

Using Container as a Service (CaaS) to deploy application containers to run their code.


Expert Solution
Questions # 26:

Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?

Options:

A.

Cyber threat protection


B.

Inspection of all traffic


C.

Least privileges access control


D.

Network segmentation


Expert Solution
Questions # 27:

Match each tunneling protocol to its definition.

Question # 27


Expert Solution
Questions # 28:

Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?

Options:

A.

Benign


B.

Tolerated


C.

Sanctioned


D.

Secure


Expert Solution
Questions # 29:

Which method is used to exploit vulnerabilities, services, and applications?

Options:

A.

encryption


B.

port scanning


C.

DNS tunneling


D.

port evasion


Expert Solution
Questions # 30:

Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?

Options:

A.

Shortest Path


B.

Hop Count


C.

Split Horizon


D.

Path Vector


Expert Solution
Viewing page 3 out of 5 pages
Viewing questions 21-30 out of questions