New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions
Questions # 21:

What protocol requires all routers in the same domain to maintain a map of the network?

Options:

A.

EIGRP


B.

Static


C.

RIP


D.

OSPF


Expert Solution
Questions # 22:

A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?

Options:

A.

whaling


B.

phishing


C.

pharming


D.

spam


Expert Solution
Questions # 23:

Which security function enables a firewall to validate the operating system version of a device before granting it network access?

Options:

A.

Sandboxing


B.

Stateless packet inspection


C.

Host intrusion prevention system (HIPS)


D.

Identity Threat Detection and Response (ITDR)


Expert Solution
Questions # 24:

What does SOAR technology use to automate and coordinate workflows?

Options:

A.

algorithms


B.

Cloud Access Security Broker


C.

Security Incident and Event Management


D.

playbooks


Expert Solution
Questions # 25:

What are two capabilities of identity threat detection and response (ITDR)? (Choose two.)

Options:

A.

Securing individual devices


B.

Matching risks to signatures


C.

Scanning for excessive logins


D.

Analyzing access management logs


Expert Solution
Questions # 26:

Which type of malware replicates itself to spread rapidly through a computer network?

Options:

A.

ransomware


B.

Trojan horse


C.

virus


D.

worm


Expert Solution
Questions # 27:

What does SIEM stand for?

Options:

A.

Security Infosec and Event Management


B.

Security Information and Event Management


C.

Standard Installation and Event Media


D.

Secure Infrastructure and Event Monitoring


Expert Solution
Questions # 28:

What is required for an effective Attack Surface Management (ASM) process?

Options:

A.

Real-time data rich inventory


B.

Static inventory of assets


C.

Periodic manual monitoring


D.

Isolation of assets by default


Expert Solution
Questions # 29:

In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?

Options:

A.

Evil Twin


B.

Emotet


C.

Meddler-in-the-middle


D.

Jasager


Expert Solution
Questions # 30:

From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?

Options:

A.

Unit 52


B.

PAN-DB


C.

BrightCloud


D.

MineMeld


Expert Solution
Viewing page 3 out of 7 pages
Viewing questions 21-30 out of questions