New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?

Options:

A.

Use of non-standard ports


B.

Hiding within SSL encryption


C.

Port hopping


D.

Tunneling within commonly used services


Expert Solution
Questions # 52:

Which two network resources does a directory service database contain? (Choose two.)

Options:

A.

Services


B.

/etc/shadow files


C.

Users


D.

Terminal shell types on endpoints


Expert Solution
Questions # 53:

What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?

Options:

A.

To provide automation for application creation in the cloud


B.

To secure serverless functions across the application


C.

To secure public cloud infrastructures only


D.

To provide comprehensive logging of potential threat vectors


Expert Solution
Questions # 54:

What differentiates SOAR from SIEM?

Options:

A.

SOAR platforms focus on analyzing network traffic.


B.

SOAR platforms integrate automated response into the investigation process.


C.

SOAR platforms collect data and send alerts.


D.

SOAR platforms filter alerts with their broader coverage of security incidents.


Expert Solution
Questions # 55:

Which activity is a technique in the MITRE ATT&CK framework?

Options:

A.

Credential access


B.

Lateral movement


C.

Resource development


D.

Account discovery


Expert Solution
Questions # 56:

Which Palo Alto Networks solution has replaced legacy IPS solutions?

Options:

A.

Advanced DNS Security


B.

Advanced WildFire


C.

Advanced Threat Prevention


D.

Advanced URL Filtering


Expert Solution
Questions # 57:

Which statement describes a host-based intrusion prevention system (HIPS)?

Options:

A.

It analyzes network traffic to detect unusual traffic flows and new malware.


B.

It scans a Wi-Fi network for unauthorized access and removes unauthorized devices.


C.

It is placed as a sensor to monitor all network traffic and scan for threats.


D.

It is installed on an endpoint and inspects the device.


Expert Solution
Questions # 58:

Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?

Options:

A.

Statistical-based


B.

Knowledge-based


C.

Behavior-based


D.

Anomaly-based


Expert Solution
Questions # 59:

What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?

Options:

A.

run a static analysis


B.

check its execution policy


C.

send the executable to WildFire


D.

run a dynamic analysis


Expert Solution
Questions # 60:

Which endpoint tool or agent can enact behavior-based protection?

Options:

A.

AutoFocus


B.

Cortex XDR


C.

DNS Security


D.

MineMeld


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions