New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks Practitioner - Palo Alto Networks Cybersecurity Practitioner (PCCP)

Page: 1 / 7
Total 227 questions

Which security tool provides policy enforcement for mobile users and remote networks?

A.

Service connection

B.

Prisma Access

C.

Prisma Cloud

D.

Digital experience management

Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?

A.

Cloud

B.

Physical

C.

Virtual

D.

Containerized

Which option is a Prisma Access security service?

A.

Compute Security

B.

Firewall as a Service (FWaaS)

C.

Virtual Private Networks (VPNs)

D.

Software-defined wide-area networks (SD-WANs)

With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?

A.

container, code, cluster, cloud

B.

code, container, cluster, cloud

C.

code, container, cloud, cluster

D.

container, code, cloud, cluster

Which type of portable architecture can package software with dependencies in an isolated unit?

A.

Containerized

B.

Serverless

C.

Air-gapped

D.

SaaS

Under which category does an application that is approved by the IT department, such as Office 365, fall?

A.

unsanctioned

B.

prohibited

C.

tolerated

D.

sanctioned

Which action must Secunty Operations take when dealing with a known attack?

A.

Document, monitor, and track the incident.

B.

Limit the scope of who knows about the incident.

C.

Increase the granularity of the application firewall.

D.

Disclose details of lhe attack in accordance with regulatory standards.

What is the primary security focus after consolidating data center hypervisor hosts within trust levels?

A.

control and protect inter-host traffic using routers configured to use the Border Gateway Protocol (BGP) dynamic routing protocol

B.

control and protect inter-host traffic by exporting all your traffic logs to a sysvol log server using the User Datagram Protocol (UDP)

C.

control and protect inter-host traffic by using IPv4 addressing

D.

control and protect inter-host traffic using physical network security appliances

What differentiates Docker from a bare metal hypervisor?

A.

Docker lets the user boot up one or more instances of an operating system on the same host whereas hypervisors do not

B.

Docker uses more resources than a bare metal hypervisor

C.

Docker is more efficient at allocating resources for legacy systems

D.

Docker uses OS-level virtualization, whereas a bare metal hypervisor runs independently from the OS

What is a function of SSL/TLS decryption?

A.

It applies to unknown threat detection only.

B.

It reveals malware within web-based traffic.

C.

It protects users from social engineering.

D.

It identifies loT devices on the internet.