Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium Paloalto Networks Practitioner Dumps Questions Answers

Page: 1 / 17
Total 227 questions

Palo Alto Networks Cybersecurity Practitioner (PCCP) Questions and Answers

Question 1

Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?

Options:

A.

DNS security

B.

Advanced WildFire

C.

loT security

D.

Advanced Threat Prevention

Buy Now
Question 2

Which aspect of a SaaS application requires compliance with local organizational security policies?

Options:

A.

Types of physical storage media used

B.

Data-at-rest encryption standards

C.

Acceptable use of the SaaS application

D.

Vulnerability scanning and management

Question 3

Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?

Options:

A.

Elastic scalability

B.

5G

C.

External dynamic lists

D.

Log export

Question 4

Which of the following is a CI/CD platform?

Options:

A.

Github

B.

Jira

C.

Atom.io

D.

Jenkins

Question 5

A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.

Which type of phishing attack does this represent?

Options:

A.

Whaling

B.

Vishing

C.

Pharming

D.

Angler phishing

Question 6

Which statement describes a host-based intrusion prevention system (HIPS)?

Options:

A.

It analyzes network traffic to detect unusual traffic flows and new malware.

B.

It scans a Wi-Fi network for unauthorized access and removes unauthorized devices.

C.

It is placed as a sensor to monitor all network traffic and scan for threats.

D.

It is installed on an endpoint and inspects the device.

Question 7

Which endpoint product from Palo Alto Networks can help with SOC visibility?

Options:

A.

STIX

B.

Cortex XDR

C.

WildFire

D.

AutoFocus

Question 8

Given the graphic, match each stage of the cyber-attack lifecycle to its description.

Options:

Question 9

Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?

Options:

A.

Threat Prevention

B.

DNS Security

C.

WildFire

D.

URL Filtering

Question 10

Which of the following is an AWS serverless service?

Options:

A.

Beta

B.

Kappa

C.

Delta

D.

Lambda

Question 11

Which tool's analysis data gives security operations teams insight into their environment's risks from exposed services?

Options:

A.

IIDP

B.

IAM

C.

SIM

D.

Xpanse

Question 12

A firewall administrator needs to efficiently deploy corporate account configurations and VPN settings to targeted mobile devices within the network.

Which technology meets this requirement?

Options:

A.

SIEM

B.

MDM

C.

EDR

D.

ADEM

Question 13

Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?

Options:

A.

Group policy

B.

Stateless

C.

Stateful

D.

Static packet-filter

Question 14

What protocol requires all routers in the same domain to maintain a map of the network?

Options:

A.

EIGRP

B.

Static

C.

RIP

D.

OSPF

Question 15

Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?

Options:

A.

User-ID

B.

Device-ID

C.

App-ID

D.

Content-ID

Question 16

What should a security operations engineer do if they are presented with an encoded string during an incident investigation?

Options:

A.

Save it to a new file and run it in a sandbox.

B.

Run it against VirusTotal.

C.

Append it to the investigation notes but do not alter it.

D.

Decode the string and continue the investigation.

Question 17

Which feature is part of an intrusion prevention system (IPS)?

Options:

A.

API-based coverage of apps

B.

Automated security actions

C.

Protection of data at rest

D.

Real-time web filtering

Question 18

What is an operation of an Attack Surface Management (ASM) platform?

Options:

A.

It scans assets in the cloud space for remediation of compromised sanctioned SaaS applications.

B.

It continuously identifies all internal and external internet-connected assets for potential attack vectors and exposures.

C.

It identifies and monitors the movement of data within, into, and out of an organization's network.

D.

It detects and remediates misconfigured security settings in sanctioned SaaS applications through monitoring.

Question 19

What is a key advantage and key risk in using a public cloud environment?

Options:

A.

Multi-tenancy

B.

Dedicated Networks

C.

Dedicated Hosts

D.

Multiplexing

Question 20

With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?

Options:

A.

container, code, cluster, cloud

B.

code, container, cluster, cloud

C.

code, container, cloud, cluster

D.

container, code, cloud, cluster

Question 21

You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.

Which type of attack is this?

Options:

A.

Whaling

B.

Spamming

C.

Spear phishing

D.

Phishing

Question 22

Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?

Options:

A.

User-ID

B.

Lightweight Directory Access Protocol (LDAP)

C.

User and Entity Behavior Analytics (UEBA)

D.

Identity and Access Management (IAM)

Question 23

A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.

Which NIST cloud service model is this?

Options:

A.

IaaS

B.

SaaS

C.

PaaS

D.

CaaS

Question 24

Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?

Options:

A.

Cortex XSOAR

B.

Prisma Cloud

C.

AutoFocus

D.

Cortex XDR

Question 25

Which network firewall primarily filters traffic based on source and destination IP address?

Options:

A.

Proxy

B.

Stateful

C.

Stateless

D.

Application

Question 26

Which endpoint protection security option can prevent malware from executing software?

Options:

A.

Application allow list

B.

DNS Security

C.

URL filtering

D.

Dynamic access control

Question 27

What are three benefits of the cloud native security platform? (Choose three.)

Options:

A.

Increased throughput

B.

Exclusivity

C.

Agility

D.

Digital transformation

E.

Flexibility

Question 28

What is a key method used to secure sensitive data in Software-as-a-Service (SaaS) applications?

Options:

A.

Allow downloads to managed devices but block them from unmanaged devices.

B.

Allow downloads to both managed and unmanaged devices.

C.

Leave data security in the hands of the cloud service provider.

D.

Allow users to choose their own applications to access data.

Question 29

What are two examples of an attacker using social engineering? (Choose two.)

Options:

A.

Convincing an employee that they are also an employee

B.

Leveraging open-source intelligence to gather information about a high-level executive

C.

Acting as a company representative and asking for personal information not relevant to the reason for their call

D.

Compromising a website and configuring it to automatically install malicious files onto systems that visit the page

Question 30

Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?

Options:

A.

You may have to use port numbers greater than 1024 for your business-critical applications.

B.

You may have to open up multiple ports and these ports could also be used to gain unauthorized entry into your datacenter.

C.

You may not be able to assign the correct port to your business-critical applications.

D.

You may not be able to open up enough ports for your business-critical applications which will increase the attack surface area.

Question 31

Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?

Options:

A.

Use of non-standard ports

B.

Hiding within SSL encryption

C.

Port hopping

D.

Tunneling within commonly used services

Question 32

Which component of the AAA framework verifies user identities so they may access the network?

Options:

A.

Allowance

B.

Authorization

C.

Accounting

D.

Authentication

Question 33

Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)

Options:

A.

Birthplace

B.

Login 10

C.

Profession

D.

Name

Question 34

Which technology grants enhanced visibility and threat prevention locally on a device?

Options:

A.

EDR

B.

IDS

C.

SIEM

D.

DLP

Question 35

When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)

Options:

A.

decrypt the infected file using base64

B.

alert system administrators

C.

quarantine the infected file

D.

delete the infected file

E.

remove the infected file’s extension

Question 36

Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?

Options:

A.

XDR

B.

STEP

C.

SOAR

D.

SIEM

Question 37

How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?

Options:

A.

It creates an encrypted connection to the company's data center.

B.

It performs SSL decryption to give visibility into user traffic.

C.

II prevents sensitive data from leaving the network.

D.

II automates the ingestion and aggregation of indicators.

Question 38

How can local systems eliminate vulnerabilities?

Options:

A.

Patch systems and software effectively and continuously.

B.

Create preventative memory-corruption techniques.

C.

Perform an attack on local systems.

D.

Test and deploy patches on a focused set of systems.

Question 39

What is an advantage of virtual firewalls over physical firewalls for internal segmentation when placed in a data center?

Options:

A.

They are dynamically scalable.

B.

They possess unlimited throughput capability.

C.

They are able to prevent evasive threats.

D.

They have failover capability.

Question 40

Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?

Options:

A.

CSPM

B.

ASM

C.

EDR

D.

CVVP

Question 41

Which tool automates remediation of a confirmed cybersecurity breach?

Options:

A.

SIEM

B.

EDR

C.

SOAR

D.

ISIM

Question 42

The seventy of an attack needs to be escalated.

What needs to be in place in order for the security operations team to properly inform various units within the enterprise of the issue?

Options:

A.

Interface Agreement

B.

FAO Incident Site —

C.

Corporate Executive Listserv

D.

Security Breach Blog

Question 43

Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?

Options:

A.

Network

B.

Management

C.

Cloud

D.

Security

Question 44

Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?

Options:

A.

DDoS

B.

DNS tunneling

C.

Command-and-control (C2)

D.

Port evasion

Question 45

Which key component is used to configure a static route?

Options:

A.

router ID

B.

enable setting

C.

routing protocol

D.

next hop IP address

Question 46

You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.

What deployment options do you have available? (Choose two.)

Options:

A.

PA-Series

B.

VM-Series

C.

Panorama

D.

CN-Series

Question 47

Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?

Options:

A.

O Multicloud

B.

O 5G -

C.

Micro-segmentation

D.

DevOps

Question 48

In the attached network diagram, which device is the switch?

Options:

A.

A

B.

B

C.

C

D.

D

Question 49

Which type of portable architecture can package software with dependencies in an isolated unit?

Options:

A.

Containerized

B.

Serverless

C.

Air-gapped

D.

SaaS

Question 50

Which option is an example of a North-South traffic flow?

Options:

A.

Lateral movement within a cloud or data center

B.

An internal three-tier application

C.

Client-server interactions that cross the edge perimeter

D.

Traffic between an internal server and internal user

Question 51

Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?

Options:

A.

Global Protect

B.

WildFire

C.

AutoFocus

D.

STIX

Question 52

Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?

Options:

A.

Virtual

B.

Container

C.

Physical

D.

SASE

Question 53

What does SOAR technology use to automate and coordinate workflows?

Options:

A.

algorithms

B.

Cloud Access Security Broker

C.

Security Incident and Event Management

D.

playbooks

Question 54

Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?

Options:

A.

Knowledge-based

B.

Signature-based

C.

Behavior-based

D.

Database-based

Question 55

Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?

Options:

A.

during the selective network security virtualization phase, all intra-host communication paths are strictly controlled

B.

during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy server

C.

during the selective network security virtualization phase, all intra-host traffic is encapsulated and encrypted using the IPSEC protocol

D.

during the selective network security virtualization phase, all intra-host traffic is load balanced

Question 56

What type of attack redirects the traffic of a legitimate website to a fake website?

Options:

A.

Watering hole

B.

Pharming

C.

Spear phishing

D.

Whaling

Question 57

Which technique changes protocols at random during a session?

Options:

A.

use of non-standard ports

B.

port hopping

C.

hiding within SSL encryption

D.

tunneling within commonly used services

Question 58

During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?

Options:

A.

Frame

B.

Segment

C.

Packet

D.

Data

Question 59

What is the purpose of host-based architectures?

Options:

A.

They share the work of both clients and servers.

B.

They allow client computers to perform most of the work.

C.

They divide responsibilities among clients.

D.

They allow a server to perform all of the work virtually.

Question 60

Which statement is true about advanced persistent threats?

Options:

A.

They use script kiddies to carry out their attacks.

B.

They have the skills and resources to launch additional attacks.

C.

They lack the financial resources to fund their activities.

D.

They typically attack only once.

Question 61

Which two network resources does a directory service database contain? (Choose two.)

Options:

A.

Services

B.

/etc/shadow files

C.

Users

D.

Terminal shell types on endpoints

Question 62

Which type of Wi-Fi attack depends on the victim initiating the connection?

Options:

A.

Evil twin

B.

Jasager

C.

Parager

D.

Mirai

Question 63

Which method is used to exploit vulnerabilities, services, and applications?

Options:

A.

encryption

B.

port scanning

C.

DNS tunneling

D.

port evasion

Question 64

Which characteristic of serverless computing enables developers to quickly deploy application code?

Options:

A.

Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand

B.

Uploading the application code itself, without having to provision a full container image or any OS virtual machine components

C.

Using cloud service spot pricing to reduce the cost of using virtual machines to run their application code

D.

Using Container as a Service (CaaS) to deploy application containers to run their code.

Question 65

What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?

Options:

A.

run a static analysis

B.

check its execution policy

C.

send the executable to WildFire

D.

run a dynamic analysis

Question 66

Which element of the security operations process is concerned with using external functions to help achieve goals?

Options:

A.

interfaces

B.

business

C.

technology

D.

people

Question 67

Which term describes establishment of on-premises software on a cloud-based server?

Options:

A.

Serverless

B.

Dockers

C.

Cloud-hosted

D.

Kubernetes

Question 68

Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?

Options:

A.

Advanced malware

B.

Smishing

C.

Reconnaissance

D.

Denial of service

Page: 1 / 17
Total 227 questions