Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCCP - Palo Alto Certified Cybersecurity Practitioner (PCCP)

Page: 1 / 3
Total 70 questions

Which architecture model uses virtual machines (VMs) in a public cloud environment?

A.

Kubernetes

B.

Serverless

C.

Docker

D.

Host-based

Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?

A.

Virtual

B.

Container

C.

Physical

D.

SASE

Which feature of cloud-native security platforms (CNSPs) focuses on protecting virtual machine (VM), container, and serverless deployments against application-level attacks during runtime?

A.

Workload security

B.

Data security

C.

Asset inventory

D.

Configuration assessment

What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?

A.

To provide automation for application creation in the cloud

B.

To secure serverless functions across the application

C.

To secure public cloud infrastructures only

D.

To provide comprehensive logging of potential threat vectors

What is an event-driven snippet of code that runs on managed infrastructure?

A.

API

B.

Serverless function

C.

Hypervisor

D.

Docker container

What type of attack redirects the traffic of a legitimate website to a fake website?

A.

Watering hole

B.

Pharming

C.

Spear phishing

D.

Whaling

Which scenario highlights how a malicious Portable Executable (PE) file is leveraged as an attack?

A.

Setting up a web page for harvesting user credentials

B.

Laterally transferring the file through a network after being granted access

C.

Embedding the file inside a pdf to be downloaded and installed

D.

Corruption of security device memory spaces while file is in transit

Which component of the AAA framework verifies user identities so they may access the network?

A.

Allowance

B.

Authorization

C.

Accounting

D.

Authentication

Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?

A.

IIDP

B.

IAM

C.

SIM

D.

Xpanse

An administrator finds multiple gambling websites in the network traffic log.

What can be created to dynamically block these websites?

A.

URL category

B.

Custom signatures

C.

Decryption policy

D.

Application group