Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCCET - Palo Alto Networks Certified Cybersecurity Entry-level Technician

Page: 5 / 5
Total 158 questions

In a traditional data center what is one result of sequential traffic analysis?

A.

simplifies security policy management

B.

reduces network latency

C.

causes security policies to be complex

D.

improves security policy application ID enforcement

The customer is responsible only for which type of security when using a SaaS application?

A.

physical

B.

platform

C.

data

D.

infrastructure

Which endpoint tool or agent can enact behavior-based protection?

A.

AutoFocus

B.

Cortex XDR

C.

DNS Security

D.

MineMeld

Which two statements describe the Jasager attack? (Choose two.)

A.

â–¡ The victim must manually choose the attacker s access point

B.

â–¡ It actively responds to beacon reguests.

C.

â–¡ It tries to get victims to conned at random.

D.

â–¡ The attacker needs to be wilhin close proximity of the victim.

A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?

A.

whaling

B.

phishing

C.

pharming

D.

spam

In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?

A.

False-positive

B.

True-negative

C.

False-negative

D.

True-positive

What is used to orchestrate, coordinate, and control clusters of containers?

A.

Kubernetes

B.

Prisma Saas

C.

Docker

D.

CN-Series