Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCCET - Palo Alto Networks Certified Cybersecurity Entry-level Technician

Page: 1 / 5
Total 158 questions

How does Prisma SaaS provide protection for Sanctioned SaaS applications?

A.

Prisma SaaS connects to an organizations internal print and file sharing services to provide protection and sharing visibility

B.

Prisma SaaS does not provide protection for Sanctioned SaaS applications because they are secure

C.

Prisma access uses Uniform Resource Locator (URL) Web categorization to provide protection and sharing visibility

D.

Prisma SaaS connects directly to sanctioned external service providers SaaS application service to provide protection and sharing visibility

Which attacker profile acts independently or as part of an unlawful organization?

A.

cybercriminal

B.

cyberterrorist

C.

state-affiliated group

D.

hacktivist

Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?

A.

SaaS

B.

DaaS

C.

PaaS

D.

IaaS

Which core component is used to implement a Zero Trust architecture?

A.

VPN Concentrator

B.

Content Identification

C.

Segmentation Platform

D.

Web Application Zone

In the attached network diagram, which device is the switch?

A.

A

B.

B

C.

C

D.

D

What are three benefits of the cloud native security platform? (Choose three.)

A.

Increased throughput

B.

Exclusivity

C.

Agility

D.

Digital transformation

E.

Flexibility

How does adopting a serverless model impact application development?

A.

costs more to develop application code because it uses more compute resources

B.

slows down the deployment of application code, but it improves the quality of code development

C.

reduces the operational overhead necessary to deploy application code

D.

prevents developers from focusing on just the application code because you need to provision the underlying infrastructure to run the code

Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?

A.

3G

B.

Z-wave

C.

802.11ax

D.

C-band

Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?

A.

Cyber threat protection

B.

Inspection of all traffic

C.

Least privileges access control

D.

Network segmentation

What is the definition of a zero-day threat?

A.

The amount of time it takes to discover a vulnerability and release a security fix

B.

The period between the discovery of a vulnerability and development and release of a patch

C.

The day a software vendor becomes aware of an exploit and prevents any further hacking

D.

A specific day during which zero threats occurred