Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCCET - Palo Alto Networks Certified Cybersecurity Entry-level Technician

Page: 4 / 5
Total 158 questions

Organizations that transmit, process, or store payment-card information must comply with what standard?

A.

HIPAA

B.

CISA

C.

GDPR

D.

PCI DSS

Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?

A.

between PaaS and FaaS

B.

between IaaS and PaaS

C.

between On-Prem and IaaS

D.

between FaaS and Serverless

Which network firewall primarily filters traffic based on source and destination IP address?

A.

Proxy

B.

Stateful

C.

Stateless

D.

Application

Which key component is used to configure a static route?

A.

router ID

B.

enable setting

C.

routing protocol

D.

next hop IP address

Which native Windows application can be used to inspect actions taken at a specific time?

A.

Event Viewer

B.

Timeline inspector

C.

Task Manager

D.

Task Scheduler

Which product from Palo Alto Networks enables organizations to prevent successful cyberattacks as well as simplify and strengthen security processes?

A.

Expedition

B.

AutoFocus

C.

MineMeld

D.

Cortex XDR

Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?

A.

an intranet-accessed contractor’s system that was compromised

B.

exploitation of an unpatched security vulnerability

C.

access by using a third-party vendor’s password

D.

a phishing scheme that captured a database administrator’s password

Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?

A.

You may have to use port numbers greater than 1024 for your business-critical applications.

B.

You may have to open up multiple ports and these ports could also be used to gain unauthorized entry into your datacenter.

C.

You may not be able to assign the correct port to your business-critical applications.

D.

You may not be able to open up enough ports for your business-critical applications which will increase the attack surface area.

Which IPsec feature allows device traffic to go directly to the Internet?

A.

Split tunneling

B.

Diffie-Hellman groups

C.

d.Authentication Header (AH)

D.

IKE Security Association

Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?

A.

North-South traffic

B.

Intrazone traffic

C.

East-West traffic

D.

Interzone traffic