Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks PCCP - Palo Alto Certified Cybersecurity Practitioner (PCCP)

Page: 2 / 3
Total 70 questions

Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?

A.

Advanced malware

B.

Smishing

C.

Reconnaissance

D.

Denial of service

Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)

A.

Hardware procurement

B.

Log normalization

C.

Initial security team training

D.

Incident response

Which term describes establishment of on-premises software on a cloud-based server?

A.

Serverless

B.

Dockers

C.

Cloud-hosted

D.

Kubernetes

Which action is unique to the security orchestration, automation, and response (SOAR) platforms?

A.

Prioritizing alerts

B.

Enhancing data collection

C.

Usingpredefined workflows

D.

Correlating incident data

Which security function enables a firewall to validate the operating system version of a device before granting it network access?

A.

Sandboxing

B.

Stateless packet inspection

C.

Host intrusion prevention system (HIPS)

D.

Identity Threat Detection and Response (ITDR)

A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.

Which type of phishing attack does this represent?

A.

Whaling

B.

Vishing

C.

Pharming

D.

Angler phishing

Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?

A.

CSPM

B.

ASM

C.

EDR

D.

CVVP

Which statement describes the process of application allow listing?

A.

It allows only trusted files, applications, and processes to run.

B.

It creates a set of specific applications that do not run on the system.

C.

It encrypts application data to protect the system from external threats.

D.

It allows safeuse of applications by scanningfiles for malware.

When does a TLS handshake occur?

A.

Before establishing a TCP connection

B.

Only during DNS over HTTPS queries

C.

After a TCP handshake has been established

D.

Independently of HTTPS communications

What is a function of SSL/TLS decryption?

A.

It applies to unknown threat detection only.

B.

It reveals malware within web-based traffic.

C.

It protects users from social engineering.

D.

It identifies loT devices on the internet.