Month End Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Download Latest Practitioner Questions

Page: 16 / 17
Total 227 questions

Palo Alto Networks Cybersecurity Practitioner (PCCP) Questions and Answers

Question 61

Which two network resources does a directory service database contain? (Choose two.)

Options:

A.

Services

B.

/etc/shadow files

C.

Users

D.

Terminal shell types on endpoints

Question 62

Which type of Wi-Fi attack depends on the victim initiating the connection?

Options:

A.

Evil twin

B.

Jasager

C.

Parager

D.

Mirai

Question 63

Which method is used to exploit vulnerabilities, services, and applications?

Options:

A.

encryption

B.

port scanning

C.

DNS tunneling

D.

port evasion

Question 64

Which characteristic of serverless computing enables developers to quickly deploy application code?

Options:

A.

Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand

B.

Uploading the application code itself, without having to provision a full container image or any OS virtual machine components

C.

Using cloud service spot pricing to reduce the cost of using virtual machines to run their application code

D.

Using Container as a Service (CaaS) to deploy application containers to run their code.

Page: 16 / 17
Total 227 questions