New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks Practitioner - Palo Alto Networks Cybersecurity Practitioner (PCCP)

Page: 6 / 7
Total 227 questions

How does Prisma SaaS provide protection for Sanctioned SaaS applications?

A.

Prisma SaaS connects to an organizations internal print and file sharing services to provide protection and sharing visibility

B.

Prisma SaaS does not provide protection for Sanctioned SaaS applications because they are secure

C.

Prisma access uses Uniform Resource Locator (URL) Web categorization to provide protection and sharing visibility

D.

Prisma SaaS connects directly to sanctioned external service providers SaaS application service to provide protection and sharing visibility

Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?

A.

Session, Transport, Network

B.

Application, Presentation, and Session

C.

Physical, Data Link, Network

D.

Data Link, Session, Transport

Which three services are part of Prisma SaaS? (Choose three.)

A.

Data Loss Prevention

B.

DevOps

C.

Denial of Service

D.

Data Exposure Control

E.

Threat Prevention

Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?

A.

Routing Information Protocol (RIP)

B.

Border Gateway Protocol (BGP)

C.

Open Shortest Path First (OSPF)

D.

Split horizon

Which two workflows are improved by integrating SIEMs with other security solutions? (Choose two.)

A.

Hardware procurement

B.

Log normalization

C.

Initial security team training

D.

Incident response

How can local systems eliminate vulnerabilities?

A.

Patch systems and software effectively and continuously.

B.

Create preventative memory-corruption techniques.

C.

Perform an attack on local systems.

D.

Test and deploy patches on a focused set of systems.

Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.

A.

It cannot identify command-and-control traffic

B.

It assumes that all internal devices are untrusted

C.

It assumes that every internal endpoint can be trusted

D.

It cannot monitor all potential network ports

Which characteristic of serverless computing enables developers to quickly deploy application code?

A.

Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand

B.

Uploading the application code itself, without having to provision a full container image or any OS virtual machine components

C.

Using cloud service spot pricing to reduce the cost of using virtual machines to run their application code

D.

Using Container as a Service (CaaS) to deploy application containers to run their code.

Which endpoint protection security option can prevent malware from executing software?

A.

Application allow list

B.

DNS Security

C.

URL filtering

D.

Dynamic access control

What are two advantages of security orchestration, automation, and response (SOAR)? (Choose two.)

A.

Completely isolated system

B.

Scripting of manual tasks

C.

Consistent incident handling

D.

Long-term retention of logs