New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks Practitioner - Palo Alto Networks Cybersecurity Practitioner (PCCP)

Page: 2 / 7
Total 227 questions

What is a key benefit of Cortex XDR?

A.

It acts as a safety net during an attack while patches are developed.

B.

It secures internal network traffic against unknown threats.

C.

It manages applications accessible on endpoints.

D.

It reduces the need for network security.

Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?

A.

during the selective network security virtualization phase, all intra-host communication paths are strictly controlled

B.

during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy server

C.

during the selective network security virtualization phase, all intra-host traffic is encapsulated and encrypted using the IPSEC protocol

D.

during the selective network security virtualization phase, all intra-host traffic is load balanced

In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?

A.

the network is large

B.

the network is small

C.

the network has low bandwidth requirements

D.

the network needs backup routes

Which two network resources does a directory service database contain? (Choose two.)

A.

Services

B.

/etc/shadow files

C.

Users

D.

Terminal shell types on endpoints

What are three benefits of the cloud native security platform? (Choose three.)

A.

Increased throughput

B.

Exclusivity

C.

Agility

D.

Digital transformation

E.

Flexibility

What are two limitations of signature-based anti-malware software? (Choose two.)

A.

It is unable to detect polymorphic malware.

B.

It requires samples lo be buffered

C.

It uses a static file for comparing potential threats.

D.

It only uses packet header information.

In the attached network diagram, which device is the switch?

A.

A

B.

B

C.

C

D.

D

On which security principle does virtualization have positive effects?

A.

integrity

B.

confidentiality

C.

availability

D.

non-repudiation

In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?

A.

Computer

B.

Switch

C.

Infrastructure

D.

Cloud

Which service is encompassed by serverless architecture?

A.

Infrastructure as a Service (laaS)

B.

Function as a Service (FaaS)

C.

Security as a Service (SaaS)

D.

Authentication as a Service