New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?

Options:

A.

weaponization


B.

reconnaissance


C.

exploitation


D.

delivery


Expert Solution
Questions # 12:

Which option is an example of a North-South traffic flow?

Options:

A.

Lateral movement within a cloud or data center


B.

An internal three-tier application


C.

Client-server interactions that cross the edge perimeter


D.

Traffic between an internal server and internal user


Expert Solution
Questions # 13:

What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?

Options:

A.

requires the use of only one cloud service provider


B.

enables on-demand network services


C.

requires the use of two or more cloud service providers


D.

defines any network service


Expert Solution
Questions # 14:

Given the graphic, match each stage of the cyber-attack lifecycle to its description.

Question # 14

Question # 14


Expert Solution
Questions # 15:

On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?

Options:

A.

operating system patches


B.

full-disk encryption


C.

periodic data backups


D.

endpoint-based firewall


Expert Solution
Questions # 16:

On an endpoint, which method should you use to secure applications against exploits?

Options:

A.

endpoint-based firewall


B.

strong user passwords


C.

full-disk encryption


D.

software patches


Expert Solution
Questions # 17:

Under which category does an application that is approved by the IT department, such as Office 365, fall?

Options:

A.

unsanctioned


B.

prohibited


C.

tolerated


D.

sanctioned


Expert Solution
Questions # 18:

Which component of the AAA framework regulates user access and permissions to resources?

Options:

A.

Authorization


B.

Allowance


C.

Accounting


D.

Authentication


Expert Solution
Questions # 19:

When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)

Options:

A.

decrypt the infected file using base64


B.

alert system administrators


C.

quarantine the infected file


D.

delete the infected file


E.

remove the infected file’s extension


Expert Solution
Questions # 20:

What is a dependency for the functionality of signature-based malware detection?

Options:

A.

Frequent database updates


B.

Support of a DLP device


C.

API integration with a sandbox


D.

Enabling quality of service


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions