Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

Which endpoint protection security option can prevent malware from executing software?

Options:

A.

Application allow list


B.

DNS Security


C.

URL filtering


D.

Dynamic access control


Expert Solution
Questions # 52:

Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?

Options:

A.

Cortex XSOAR


B.

Prisma Cloud


C.

AutoFocus


D.

Cortex XDR


Expert Solution
Questions # 53:

Which term describes establishment of on-premises software on a cloud-based server?

Options:

A.

Serverless


B.

Dockers


C.

Cloud-hosted


D.

Kubernetes


Expert Solution
Questions # 54:

When does a TLS handshake occur?

Options:

A.

Before establishing a TCP connection


B.

Only during DNS over HTTPS queries


C.

After a TCP handshake has been established


D.

Independently of HTTPS communications


Expert Solution
Questions # 55:

Which two statements describe the Jasager attack? (Choose two.)

Options:

A.

□ The victim must manually choose the attacker s access point


B.

□ It actively responds to beacon reguests.


C.

□ It tries to get victims to conned at random.


D.

□ The attacker needs to be wilhin close proximity of the victim.


Expert Solution
Questions # 56:

Which technology secures software-as-a-service (SaaS) applications and network data, and also enforces compliance policies for application access?

Options:

A.

DLP


B.

CASB


C.

DNS Security


D.

URL filtering


Expert Solution
Questions # 57:

TCP is the protocol of which layer of the OSI model?

Options:

A.

Transport


B.

Session


C.

Data Link


D.

Application


Expert Solution
Questions # 58:

Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?

Options:

A.

Network


B.

Management


C.

Cloud


D.

Security


Expert Solution
Questions # 59:

Which statement describes the process of application allow listing?

Options:

A.

It allows only trusted files, applications, and processes to run.


B.

It creates a set of specific applications that do not run on the system.


C.

It encrypts application data to protect the system from external threats.


D.

It allows safe use of applications by scanning files for malware.


Expert Solution
Questions # 60:

In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?

Options:

A.

Evil Twin


B.

Emotet


C.

Meddler-in-the-middle


D.

Jasager


Expert Solution
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions