New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks Practitioner - Palo Alto Networks Cybersecurity Practitioner (PCCP)

Page: 4 / 7
Total 227 questions

Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?

A.

API

B.

Code security

C.

Virtualization

D.

IRP

Which of these ports is normally associated with HTTPS?

A.

443

B.

5050

C.

25

D.

80

At which layer of the OSI model are routing protocols defined?

A.

Network

B.

Physical

C.

Transport

D.

Data Link

Which native Windows application can be used to inspect actions taken at a specific time?

A.

Event Viewer

B.

Timeline inspector

C.

Task Manager

D.

Task Scheduler

Which of the following is a Routed Protocol?

A.

Routing Information Protocol (RIP)

B.

Transmission Control Protocol (TCP)

C.

Internet Protocol (IP)

D.

Domain Name Service (DNS)

How does adopting a serverless model impact application development?

A.

costs more to develop application code because it uses more compute resources

B.

slows down the deployment of application code, but it improves the quality of code development

C.

reduces the operational overhead necessary to deploy application code

D.

prevents developers from focusing on just the application code because you need to provision the underlying infrastructure to run the code

What is an advantage of virtual firewalls over physical firewalls for internal segmentation when placed in a data center?

A.

They are dynamically scalable.

B.

They possess unlimited throughput capability.

C.

They are able to prevent evasive threats.

D.

They have failover capability.

What is a reason IoT devices are more susceptible to command-and-control (C2) attacks?

A.

Decreased connection quality within a local area network

B.

Increased sharing of data through the internet

C.

Higher attack surface due to mobility

D.

Limited batten/ life preventing always-on security

Given the graphic, match each stage of the cyber-attack lifecycle to its description.

Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?

A.

3G

B.

Z-wave

C.

802.11ax

D.

C-band