Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Certified Cybersecurity Associate Practitioner Full Course Free

Page: 8 / 17
Total 227 questions

Palo Alto Networks Cybersecurity Practitioner (PCCP) Questions and Answers

Question 29

What are two examples of an attacker using social engineering? (Choose two.)

Options:

A.

Convincing an employee that they are also an employee

B.

Leveraging open-source intelligence to gather information about a high-level executive

C.

Acting as a company representative and asking for personal information not relevant to the reason for their call

D.

Compromising a website and configuring it to automatically install malicious files onto systems that visit the page

Question 30

Which item accurately describes a security weakness that is caused by implementing a “ports first” data security solution in a traditional data center?

Options:

A.

You may have to use port numbers greater than 1024 for your business-critical applications.

B.

You may have to open up multiple ports and these ports could also be used to gain unauthorized entry into your datacenter.

C.

You may not be able to assign the correct port to your business-critical applications.

D.

You may not be able to open up enough ports for your business-critical applications which will increase the attack surface area.

Question 31

Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?

Options:

A.

Use of non-standard ports

B.

Hiding within SSL encryption

C.

Port hopping

D.

Tunneling within commonly used services

Question 32

Which component of the AAA framework verifies user identities so they may access the network?

Options:

A.

Allowance

B.

Authorization

C.

Accounting

D.

Authentication

Page: 8 / 17
Total 227 questions