Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions
Questions # 31:

Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?

Options:

A.

DNS security


B.

Advanced WildFire


C.

loT security


D.

Advanced Threat Prevention


Expert Solution
Questions # 32:

Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?

Options:

A.

SaaS


B.

DaaS


C.

PaaS


D.

IaaS


Expert Solution
Questions # 33:

Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?

Options:

A.

Impact


B.

Privilege escalation


C.

Data exfiltration


D.

Persistence


Expert Solution
Questions # 34:

What are two functions of an active monitoring system? (Choose two.)

Options:

A.

Preventing specific changes from being affected in the system


B.

Determining system health using unaltered system data


C.

Detecting micro-services in a default configuration


D.

Using probes to establish potential load issues


Expert Solution
Questions # 35:

Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?

Options:

A.

cybercriminals


B.

state-affiliated groups


C.

hacktivists


D.

cyberterrorists


Expert Solution
Questions # 36:

What are three benefits of the cloud native security platform? (Choose three.)

Options:

A.

Increased throughput


B.

Exclusivity


C.

Agility


D.

Digital transformation


E.

Flexibility


Expert Solution
Questions # 37:

In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)

Options:

A.

SaaS


B.

PaaS


C.

On-premises


D.

IaaS


Expert Solution
Questions # 38:

What are two functions of User and Entity Behavior Analytics (UEBA) data in Prisma Cloud CSPM? (Choose two.)

Options:

A.

Assessing severity levels


B.

Identifying misconfigurations


C.

Unifying cloud provider services


D.

Detecting and correlating anomalies


Expert Solution
Questions # 39:

Under which category does an application that is approved by the IT department, such as Office 365, fall?

Options:

A.

unsanctioned


B.

prohibited


C.

tolerated


D.

sanctioned


Expert Solution
Questions # 40:

In a traditional data center what is one result of sequential traffic analysis?

Options:

A.

simplifies security policy management


B.

reduces network latency


C.

causes security policies to be complex


D.

improves security policy application ID enforcement


Expert Solution
Viewing page 4 out of 7 pages
Viewing questions 31-40 out of questions