Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCCET - Palo Alto Networks Certified Cybersecurity Entry-level Technician

Page: 2 / 5
Total 158 questions

Which method is used to exploit vulnerabilities, services, and applications?

A.

encryption

B.

port scanning

C.

DNS tunneling

D.

port evasion

Given the graphic, match each stage of the cyber-attack lifecycle to its description.

Match the DNS record type to its function within DNS.

What type of area network connects end-user devices?

A.

Wide Area Network (WAN)

B.

Campus Area Network (CAN)

C.

Local Area Network (LAN)

D.

Personal Area Network (PAN)

What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?

A.

connectors and interfaces

B.

infrastructure and containers

C.

containers and developers

D.

data center and UPS

Order the OSI model with Layer7 at the top and Layer1 at the bottom.

Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?

A.

User-ID

B.

Lightweight Directory Access Protocol (LDAP)

C.

User and Entity Behavior Analytics (UEBA)

D.

Identity and Access Management (IAM)

Which type of malware takes advantage of a vulnerability on an endpoint or server?

A.

technique

B.

patch

C.

vulnerability

D.

exploit

With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?

A.

container, code, cluster, cloud

B.

code, container, cluster, cloud

C.

code, container, cloud, cluster

D.

container, code, cloud, cluster

If an endpoint does not know how to reach its destination, what path will it take to get there?

A.

The endpoint will broadcast to all connected network devices.

B.

The endpoint will not send the traffic until a path is clarified.

C.

The endpoint will send data to the specified default gateway.

D.

The endpoint will forward data to another endpoint to send instead.