ExamGecko

Palo Alto Networks PCCET Practice Test - Questions Answers, Page 4

Question list
Search
Search

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?

A.
Expedition
A.
Expedition
Answers
B.
Cortex XDR
B.
Cortex XDR
Answers
C.
AutoFocus
C.
AutoFocus
Answers
D.
App-ID
D.
App-ID
Answers
Suggested answer: B

Explanation:

Cortex XDR is a cloud-based, advanced endpoint protection solution that combines multiple methods of prevention against known and unknown malware, ransomware, and exploits. Cortex XDR uses behavioral threat protection, exploit prevention, and local analysis to stop the execution of malicious programs before an endpoint can be compromised. Cortex XDR also enables remediation on the endpoint following an alert or investigation, giving administrators the option to isolate, terminate, block, or quarantine malicious files or processes. Cortex XDR is part of the Cortex platform, which provides unified visibility and detection across the network, endpoint, and cloud.Reference:

Cortex XDR - Palo Alto Networks

Endpoint Protection - Palo Alto Networks

Endpoint Security - Palo Alto Networks

Preventing Malware and Ransomware With Traps - Palo Alto Networks

What does SIEM stand for?

A.
Security Infosec and Event Management
A.
Security Infosec and Event Management
Answers
B.
Security Information and Event Management
B.
Security Information and Event Management
Answers
C.
Standard Installation and Event Media
C.
Standard Installation and Event Media
Answers
D.
Secure Infrastructure and Event Monitoring
D.
Secure Infrastructure and Event Monitoring
Answers
Suggested answer: B

Explanation:

Originally designed as a tool to assist organizations with compliance and industry-specific regulations, security information and event management (SIEM) is a technology that has been around for almost two decades

Which option is an example of a North-South traffic flow?

A.
Lateral movement within a cloud or data center
A.
Lateral movement within a cloud or data center
Answers
B.
An internal three-tier application
B.
An internal three-tier application
Answers
C.
Client-server interactions that cross the edge perimeter
C.
Client-server interactions that cross the edge perimeter
Answers
D.
Traffic between an internal server and internal user
D.
Traffic between an internal server and internal user
Answers
Suggested answer: C

Explanation:

North-south refers to data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center. North-south traffic is secured by one or more physical form factor perimeter edge firewalls.

Which aspect of a SaaS application requires compliance with local organizational security policies?

A.
Types of physical storage media used
A.
Types of physical storage media used
Answers
B.
Data-at-rest encryption standards
B.
Data-at-rest encryption standards
Answers
C.
Acceptable use of the SaaS application
C.
Acceptable use of the SaaS application
Answers
D.
Vulnerability scanning and management
D.
Vulnerability scanning and management
Answers
Suggested answer: C

Explanation:

SaaS applications are cloud-based software that users can access from anywhere and any device. This poses a challenge for organizations to ensure that their employees are using the SaaS applications in a secure and compliant manner.Therefore, organizations need to establish and enforce acceptable use policies (AUPs) for SaaS applications that define the rules and guidelines for accessing and using the applications, such as who can use them, what data can be stored or shared, and what actions are prohibited12.AUPs help organizations to protect their data, prevent unauthorized access, and comply with local regulations and standards3.Reference:Using Software as a Service (SaaS) securely - NCSC,Minimum Security Standards for Software-as-a-Service (SaaS) and Platform-as-a-Service (PaaS) | University IT,How to Secure Your SaaS Applications - CyberArk

Which option describes the ''selective network security virtualization'' phase of incrementally transforming data centers?

A.
during the selective network security virtualization phase, all intra-host communication paths are strictly controlled
A.
during the selective network security virtualization phase, all intra-host communication paths are strictly controlled
Answers
B.
during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy server
B.
during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy server
Answers
C.
during the selective network security virtualization phase, all intra-host traffic is encapsulated and encrypted using the IPSEC protocol
C.
during the selective network security virtualization phase, all intra-host traffic is encapsulated and encrypted using the IPSEC protocol
Answers
D.
during the selective network security virtualization phase, all intra-host traffic is load balanced
D.
during the selective network security virtualization phase, all intra-host traffic is load balanced
Answers
Suggested answer: A

Explanation:

Selective network security virtualization: Intra-host communications and live migrations are architected at this phase. All intra-host communication paths are strictly controlled to ensure that traffic between VMs at different trust levels is intermediated either by an on-box, virtual security appliance or by an off-box, physical security appliance.

Which TCP/IP sub-protocol operates at the Layer7 of the OSI model?

A.
UDP
A.
UDP
Answers
B.
MAC
B.
MAC
Answers
C.
SNMP
C.
SNMP
Answers
D.
NFS
D.
NFS
Answers
Suggested answer: C

Explanation:

Application (Layer 7 or L7): This layer identifies and establishes availability of communication partners, determines resource availability, and synchronizes communication.

Presentation (Layer 6 or L6): This layer provides coding and conversion functions (such as data representation, character conversion, data compression, and data encryption) to ensure that data sent from the Application layer of one system is compatible with the Application layer of the receiving system.

Session (Layer 5 or L5): This layer manages communication sessions (service requests and service responses) between networked systems, including connection establishment, data transfer, and connection release.

Transport (Layer 4 or L4): This layer provides transparent, reliable data transport and end-to-end transmission control.

Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?

A.
an intranet-accessed contractor's system that was compromised
A.
an intranet-accessed contractor's system that was compromised
Answers
B.
exploitation of an unpatched security vulnerability
B.
exploitation of an unpatched security vulnerability
Answers
C.
access by using a third-party vendor's password
C.
access by using a third-party vendor's password
Answers
D.
a phishing scheme that captured a database administrator's password
D.
a phishing scheme that captured a database administrator's password
Answers
Suggested answer: D

Explanation:

The Anthem data breach of 2015 was caused by a phishing scheme that captured a database administrator's password. According to the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR), hackers sent phishing emails to an Anthem subsidiary. At least one employee responded.Attackers were able to plant malware on the company's system and gain remote access to confidential information1.The breach exposed the electronic protected health information of almost 79 million people, including names, Social Security numbers, medical identification numbers, addresses, dates of birth, email addresses, and employment information2.Reference:

Anthem Pays OCR $16 Million in Record HIPAA Settlement Following Largest U.S. Health Data Breach

How Anthem Data Breach Exposed Personnel Records - IDStrong

Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?

A.
Shortest Path
A.
Shortest Path
Answers
B.
Hop Count
B.
Hop Count
Answers
C.
Split Horizon
C.
Split Horizon
Answers
D.
Path Vector
D.
Path Vector
Answers
Suggested answer: B

Explanation:

Routing Information Protocol (RIP) is an example of a distance-vector routing protocol that uses hop count as its routing metric. To prevent routing loops, in which packets effectively get stuck bouncing between various router nodes, RIP implements a hop limit of 15, which limits the size of networks that RIP can support. After a data packet crosses 15 router nodes (hops) between a source and a destination, the destination is considered unreachable.

Why is it important to protect East-West traffic within a private cloud?

A.
All traffic contains threats, so enterprises must protect against threats across the entire network
A.
All traffic contains threats, so enterprises must protect against threats across the entire network
Answers
B.
East-West traffic contains more session-oriented traffic than other traffic
B.
East-West traffic contains more session-oriented traffic than other traffic
Answers
C.
East-West traffic contains more threats than other traffic
C.
East-West traffic contains more threats than other traffic
Answers
D.
East-West traffic uses IPv6 which is less secure than IPv4
D.
East-West traffic uses IPv6 which is less secure than IPv4
Answers
Suggested answer: A

Explanation:

East-West traffic is the lateral movement of data packets between servers within a data center, or across private and public clouds1.This type of traffic has grown substantially with the proliferation of data centers and cloud adoption, and it now surpasses the conventional North-South traffic that goes in or out of the network2.Therefore, it is important to protect East-West traffic from potential malicious actors and breaches, as threats can arise internally and move laterally without ever touching the traditional network perimeter12.By inspecting and monitoring all East-West traffic, organizations can effectively block the lateral movement of threat actors, increase network visibility, protect vital applications and data, and lower costs and risks for distributed operations23.Reference:

East-West Traffic: Everything You Need to Know | Gigamon Blog

What is East-West Security? | VMware Glossary

How to Harness East-West Visibility for a Stronger Defensive Security ...

Which IPsec feature allows device traffic to go directly to the Internet?

A.
Split tunneling
A.
Split tunneling
Answers
B.
Diffie-Hellman groups
B.
Diffie-Hellman groups
Answers
C.
d.Authentication Header (AH)
C.
d.Authentication Header (AH)
Answers
D.
IKE Security Association
D.
IKE Security Association
Answers
Suggested answer: A

Explanation:

'Or split tunneling can be configured to allow internet traffic from the device to go directly to the internet, while other specific types of traffic route through the IPsec tunnel, for acceptable protection with much less performance degradation.'

Total 159 questions
Go to page: of 16