New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
Questions # 61:

What are the two most prominent characteristics of the malware type rootkit? (Choose two.)

Options:

A.

It encrypts user data.


B.

It cannot be detected by antivirus because of its masking techniques.


C.

It takes control of the operating system.


D.

It steals personal information.


Expert Solution
Questions # 62:

Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?

Options:

A.

during the selective network security virtualization phase, all intra-host communication paths are strictly controlled


B.

during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy server


C.

during the selective network security virtualization phase, all intra-host traffic is encapsulated and encrypted using the IPSEC protocol


D.

during the selective network security virtualization phase, all intra-host traffic is load balanced


Expert Solution
Questions # 63:

Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?

Options:

A.

3G


B.

Z-wave


C.

802.11ax


D.

C-band


Expert Solution
Questions # 64:

Which feature is part of an intrusion prevention system (IPS)?

Options:

A.

API-based coverage of apps


B.

Automated security actions


C.

Protection of data at rest


D.

Real-time web filtering


Expert Solution
Questions # 65:

Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?

Options:

A.

DDoS


B.

DNS tunneling


C.

Command-and-control (C2)


D.

Port evasion


Expert Solution
Questions # 66:

What type of DNS record maps an IPV6 address to a domain or subdomain to another hostname?

Options:

A.

SOA


B.

NS


C.

AAAA


D.

MX


Expert Solution
Questions # 67:

In the attached network diagram, which device is the switch?

Question # 67

Options:

A.

A


B.

B


C.

C


D.

D


Expert Solution
Questions # 68:

Which methodology does Identity Threat Detection and Response (ITDR) use?

Options:

A.

Behavior analysis


B.

Comparison of alerts to signatures


C.

Manual inspection of user activities


D.

Rule-based activity prioritization


Expert Solution
Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions