Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

What would allow a security team to inspect TLS encapsulated traffic?

Options:

A.

DHCP markings


B.

Decryption


C.

Port translation


D.

Traffic shaping


Expert Solution
Questions # 12:

What is the primary security focus after consolidating data center hypervisor hosts within trust levels?

Options:

A.

control and protect inter-host traffic using routers configured to use the Border Gateway Protocol (BGP) dynamic routing protocol


B.

control and protect inter-host traffic by exporting all your traffic logs to a sysvol log server using the User Datagram Protocol (UDP)


C.

control and protect inter-host traffic by using IPv4 addressing


D.

control and protect inter-host traffic using physical network security appliances


Expert Solution
Questions # 13:

What is the key to “taking down” a botnet?

Options:

A.

prevent bots from communicating with the C2


B.

install openvas software on endpoints


C.

use LDAP as a directory service


D.

block Docker engine software on endpoints


Expert Solution
Questions # 14:

What differentiates SOAR from SIEM?

Options:

A.

SOAR platforms focus on analyzing network traffic.


B.

SOAR platforms integrate automated response into the investigation process.


C.

SOAR platforms collect data and send alerts.


D.

SOAR platforms filter alerts with their broader coverage of security incidents.


Expert Solution
Questions # 15:

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?

Options:

A.

XDR


B.

STEP


C.

SOAR


D.

SIEM


Expert Solution
Questions # 16:

In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?

Options:

A.

False-positive


B.

True-negative


C.

False-negative


D.

True-positive


Expert Solution
Questions # 17:

Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?

Options:

A.

Department of Homeland Security


B.

MITRE


C.

Office of Cyber Security and Information Assurance


D.

Cybersecurity Vulnerability Research Center


Expert Solution
Questions # 18:

Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?

Options:

A.

Cyber threat protection


B.

Inspection of all traffic


C.

Least privileges access control


D.

Network segmentation


Expert Solution
Questions # 19:

What does “forensics” refer to in a Security Operations process?

Options:

A.

Collecting raw data needed to complete the detailed analysis of an investigation


B.

Validating cyber analysts’ backgrounds before hiring


C.

Reviewing information about a broad range of activities


D.

Analyzing new IDS/IPS platforms for an enterprise


Expert Solution
Questions # 20:

Which activity is a technique in the MITRE ATT&CK framework?

Options:

A.

Credential access


B.

Lateral movement


C.

Resource development


D.

Account discovery


Expert Solution
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions