Pass the Paloalto Networks Certified Cybersecurity Associate PCCP Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?

Options:

A.

IIDP


B.

IAM


C.

SIM


D.

Xpanse


Expert Solution
Questions # 12:

Which component of the AAA framework regulates user access and permissions to resources?

Options:

A.

Authorization


B.

Allowance


C.

Accounting


D.

Authentication


Expert Solution
Questions # 13:

Which type of system collects data and uses correlation rules to trigger alarms?

Options:

A.

SIM


B.

SIEM


C.

UEBA


D.

SOAR


Expert Solution
Questions # 14:

What are two advantages of security orchestration, automation, and response (SOAR)? (Choose two.)

Options:

A.

Completely isolated system


B.

Scripting of manual tasks


C.

Consistent incident handling


D.

Long-term retention of logs


Expert Solution
Questions # 15:

Which feature is part of an intrusion prevention system (IPS)?

Options:

A.

API-based coverage of apps


B.

Automated security actions


C.

Protection of data at rest


D.

Real-time web filtering


Expert Solution
Questions # 16:

Which statement describes the process of application allow listing?

Options:

A.

It allows only trusted files, applications, and processes to run.


B.

It creates a set of specific applications that do not run on the system.


C.

It encrypts application data to protect the system from external threats.


D.

It allows safeuse of applications by scanningfiles for malware.


Expert Solution
Questions # 17:

Which two descriptions apply to an XDR solution? (Choose two.)

Options:

A.

It employs machine learning (ML) to identity threats.


B.

It is designed for reporting on key metrics for cloud environments.


C.

It ingests data from a wide spectrum of sources.


D.

It is focused on single-vector attacks on specific layers of defense.


Expert Solution
Questions # 18:

Which component of cloud security is used to identify misconfigurations during the development process?

Options:

A.

Container security


B.

SaaS security


C.

Code security


D.

Network security


Expert Solution
Questions # 19:

Which two services does a managed detection and response (MDR) solution provide? (Choose two.)

Options:

A.

Improved application development


B.

Incident impact analysis


C.

Periodic firewall updates


D.

Proactive threat hunting


Expert Solution
Questions # 20:

Which activity is a technique in the MITRE ATT&CK framework?

Options:

A.

Credential access


B.

Lateral movement


C.

Resource development


D.

Account discovery


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions