Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with CertsForce

Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions
Questions # 61:

A firewall administrator needs to efficiently deploy corporate account configurations and VPN settings to targeted mobile devices within the network.

Which technology meets this requirement?

Options:

A.

SIEM


B.

MDM


C.

EDR


D.

ADEM


Expert Solution
Questions # 62:

Which technology grants enhanced visibility and threat prevention locally on a device?

Options:

A.

EDR


B.

IDS


C.

SIEM


D.

DLP


Expert Solution
Questions # 63:

Which endpoint product from Palo Alto Networks can help with SOC visibility?

Options:

A.

STIX


B.

Cortex XDR


C.

WildFire


D.

AutoFocus


Expert Solution
Questions # 64:

Which action is unique to the security orchestration, automation, and response (SOAR) platforms?

Options:

A.

Prioritizing alerts


B.

Enhancing data collection


C.

Using predefined workflows


D.

Correlating incident data


Expert Solution
Questions # 65:

What are two key characteristics of a Type 1 hypervisor? (Choose two.)

Options:

A.

is hardened against cyber attacks


B.

runs without any vulnerability issues


C.

runs within an operating system


D.

allows multiple, virtual (or guest) operating systems to run concurrently on a single physical host computer


Expert Solution
Questions # 66:

Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)

Options:

A.

Detection of threats using data analysis


B.

Automation of security deployments


C.

Ingestion of log data


D.

Prevention of cvbersecurity attacks


Expert Solution
Questions # 67:

Which statement is true about advanced persistent threats?

Options:

A.

They use script kiddies to carry out their attacks.


B.

They have the skills and resources to launch additional attacks.


C.

They lack the financial resources to fund their activities.


D.

They typically attack only once.


Expert Solution
Questions # 68:

Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?

Options:

A.

Group policy


B.

Stateless


C.

Stateful


D.

Static packet-filter


Expert Solution
Viewing page 7 out of 7 pages
Viewing questions 61-70 out of questions