ExamGecko

Palo Alto Networks PCCET Practice Test - Questions Answers, Page 12

Question list
Search
Search

Question 111

Report
Export
Collapse

What is a key advantage and key risk in using a public cloud environment?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 112

Report
Export
Collapse

Which network device breaks networks into separate broadcast domains?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 113

Report
Export
Collapse

Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 114

Report
Export
Collapse

Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 115

Report
Export
Collapse

In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 116

Report
Export
Collapse

DRAG DROP

Given the graphic, match each stage of the cyber-attack lifecycle to its description.



Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 117

Report
Export
Collapse

DRAG DROP

Match the Identity and Access Management (IAM) security control with the appropriate definition.


Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 118

Report
Export
Collapse

Which classification of IDS/IPS uses a database of known vulnerabilities and attack profiles to identify intrusion attempts?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 119

Report
Export
Collapse

What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Question 120

Report
Export
Collapse

Which element of the security operations process is concerned with using external functions to help achieve goals?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member
Total 159 questions
Go to page: of 16