Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions
Questions # 41:

Match each description to a Security Operating Platform key capability.

Question # 41


Expert Solution
Questions # 42:

Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?

Options:

A.

You may have to use port numbers greater than 1024 for your business-critical applications.


B.

You may have to open up multiple ports and these ports could also be used to gain unauthorized entry into your datacenter.


C.

You may not be able to assign the correct port to your business-critical applications.


D.

You may not be able to open up enough ports for your business-critical applications which will increase the attack surface area.


Expert Solution
Questions # 43:

Given the graphic, match each stage of the cyber-attack lifecycle to its description.

Question # 43

Question # 43


Expert Solution
Questions # 44:

At which layer of the OSI model are routing protocols defined?

Options:

A.

Network


B.

Physical


C.

Transport


D.

Data Link


Expert Solution
Questions # 45:

Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?

Options:

A.

Setting up a web page for harvesting user credentials


B.

Laterally transferring the file through a network after being granted access


C.

Embedding the file inside a pdf to be downloaded and installed


D.

Corruption of security device memory spaces while file is in transit


Expert Solution
Questions # 46:

Which type of LAN technology is being displayed in the diagram?

Question # 46

Options:

A.

Star Topology


B.

Spine Leaf Topology


C.

Mesh Topology


D.

Bus Topology


Expert Solution
Questions # 47:

What are two examples of an attacker using social engineering? (Choose two.)

Options:

A.

Convincing an employee that they are also an employee


B.

Leveraging open-source intelligence to gather information about a high-level executive


C.

Acting as a company representative and asking for personal information not relevant to the reason for their call


D.

Compromising a website and configuring it to automatically install malicious files onto systems that visit the page


Expert Solution
Questions # 48:

Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?

Options:

A.

Knowledge-based


B.

Signature-based


C.

Behavior-based


D.

Database-based


Expert Solution
Questions # 49:

What is the ptrpose of automation in SOAR?

Options:

A.

To provide consistency in response to security issues


B.

To give only administrators the ability to view logs


C.

To allow easy manual entry of changes to security templates


D.

To complicate programming for system administration -


Expert Solution
Questions # 50:

Which characteristic of serverless computing enables developers to quickly deploy application code?

Options:

A.

Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand


B.

Uploading the application code itself, without having to provision a full container image or any OS virtual machine components


C.

Using cloud service spot pricing to reduce the cost of using virtual machines to run their application code


D.

Using Container as a Service (CaaS) to deploy application containers to run their code.


Expert Solution
Viewing page 5 out of 7 pages
Viewing questions 41-50 out of questions