Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

What protocol requires all routers in the same domain to maintain a map of the network?

Options:

A.

EIGRP


B.

Static


C.

RIP


D.

OSPF


Expert Solution
Questions # 2:

Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?

Options:

A.

Routing Information Protocol (RIP)


B.

Border Gateway Protocol (BGP)


C.

Open Shortest Path First (OSPF)


D.

Split horizon


Expert Solution
Questions # 3:

Which type of malware takes advantage of a vulnerability on an endpoint or server?

Options:

A.

technique


B.

patch


C.

vulnerability


D.

exploit


Expert Solution
Questions # 4:

Which option would be an example of PII that you need to prevent from leaving your enterprise network?

Options:

A.

Credit card number


B.

Trade secret


C.

National security information


D.

A symmetric encryption key


Expert Solution
Questions # 5:

In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?

Options:

A.

weaponization


B.

reconnaissance


C.

exploitation


D.

delivery


Expert Solution
Questions # 6:

Which product functions as part of a SASE solution?

Options:

A.

Cortex


B.

Prisma Cloud


C.

Kubernetes


D.

Prisma SD-WAN


Expert Solution
Questions # 7:

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?

Options:

A.

Expedition


B.

Cortex XDR


C.

AutoFocus


D.

App-ID


Expert Solution
Questions # 8:

A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.

Which type of phishing attack does this represent?

Options:

A.

Whaling


B.

Vishing


C.

Pharming


D.

Angler phishing


Expert Solution
Questions # 9:

What type of area network connects end-user devices?

Options:

A.

Wide Area Network (WAN)


B.

Campus Area Network (CAN)


C.

Local Area Network (LAN)


D.

Personal Area Network (PAN)


Expert Solution
Questions # 10:

Match the Palo Alto Networks WildFire analysis verdict with its definition.

Question # 10


Expert Solution
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions