New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks Practitioner - Palo Alto Networks Cybersecurity Practitioner (PCCP)

Page: 3 / 7
Total 227 questions

Match the Identity and Access Management (IAM) security control with the appropriate definition.

On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?

A.

operating system patches

B.

full-disk encryption

C.

periodic data backups

D.

endpoint-based firewall

Which key component is used to configure a static route?

A.

router ID

B.

enable setting

C.

routing protocol

D.

next hop IP address

Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?

A.

DDoS

B.

DNS tunneling

C.

Command-and-control (C2)

D.

Port evasion

Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?

A.

Virtual

B.

Container

C.

Physical

D.

SASE

Which type of attack includes exfiltration of data as a primary objective?

A.

Advanced persistent threat

B.

Denial-of-service (DoS)

C.

Watering hole attack

D.

Cross-Site Scripting (XSS)

The customer is responsible only for which type of security when using a SaaS application?

A.

physical

B.

platform

C.

data

D.

infrastructure

In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)

A.

SaaS

B.

PaaS

C.

On-premises

D.

IaaS

How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?

A.

DevSecOps improves pipeline security by assigning the security team as the lead team for continuous deployment

B.

DevSecOps ensures the pipeline has horizontal intersections for application code deployment

C.

DevSecOps unites the Security team with the Development and Operations teams to integrate security into the CI/CD pipeline

D.

DevSecOps does security checking after the application code has been processed through the CI/CD pipeline

What does “forensics” refer to in a Security Operations process?

A.

Collecting raw data needed to complete the detailed analysis of an investigation

B.

Validating cyber analysts’ backgrounds before hiring

C.

Reviewing information about a broad range of activities

D.

Analyzing new IDS/IPS platforms for an enterprise