ExamGecko

Palo Alto Networks PCCET Practice Test - Questions Answers, Page 8

Question list
Search
Search

In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?

A.
the network is large
A.
the network is large
Answers
B.
the network is small
B.
the network is small
Answers
C.
the network has low bandwidth requirements
C.
the network has low bandwidth requirements
Answers
D.
the network needs backup routes
D.
the network needs backup routes
Answers
Suggested answer: A

Explanation:

A static routing protocol requires that routes be created and updated manually on a router or other network device. If a static route is down, traffic can't be automatically rerouted unless an alternate route has been configured. Also, if the route is congested, traffic can't be automatically rerouted over the less congested alternate route. Static routing is practical only in very small networks or for very limited, special-case routing scenarios (for example, a destination that's used as a backup route or is reachable only via a single router). However, static routing has low bandwidth requirements (routing information isn't broadcast across the network) and some built-in security (users can route only to destinations that are specified in statically defined routes).

Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?

A.
Session, Transport, Network
A.
Session, Transport, Network
Answers
B.
Application, Presentation, and Session
B.
Application, Presentation, and Session
Answers
C.
Physical, Data Link, Network
C.
Physical, Data Link, Network
Answers
D.
Data Link, Session, Transport
D.
Data Link, Session, Transport
Answers
Suggested answer: B

Explanation:

Application (Layer 4 or L4): This layer loosely corresponds to Layers 5 through 7 of the OSI model.

Transport (Layer 3 or L3): This layer corresponds to Layer 4 of the OSI model.

Internet (Layer 2 or L2): This layer corresponds to Layer 3 of the OSI model.

Network Access (Layer 1 or L1): This layer corresponds to Layers 1 and 2 of the OSI model

A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.

Which NIST cloud service model is this?

A.
IaaS
A.
IaaS
Answers
B.
SaaS
B.
SaaS
Answers
C.
PaaS
C.
PaaS
Answers
D.
CaaS
D.
CaaS
Answers
Suggested answer: B

Explanation:

According to the NIST definition of cloud computing1, there are three service models for cloud computing: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). In the SaaS model, the cloud provider delivers the software applications over the internet, and the users access them from various devices through a web browser or a program interface. The cloud provider manages the underlying infrastructure, including the servers, databases, and code of the applications. The users do not need to install, update, or maintain the software, and they only pay for the service they use. The scenario described in the question is an example of the SaaS model, as the user is provided access over the internet to an application running on a cloud infrastructure, and the vendor hosts and maintains the servers, databases, and code of that application.Reference:

SP 800-145, The NIST Definition of Cloud Computing | CSRC

Final Version of NIST Cloud Computing Definition Published

NIST Cloud Computing Program - NCCP | NIST

SaaS - User responsible for only the data, vendor responsible for rest

Which type of malware replicates itself to spread rapidly through a computer network?

A.
ransomware
A.
ransomware
Answers
B.
Trojan horse
B.
Trojan horse
Answers
C.
virus
C.
virus
Answers
D.
worm
D.
worm
Answers
Suggested answer: D

Explanation:

A worm is a type of malware that replicates itself to spread rapidly through a computer network. Unlike a virus, a worm does not need a host program or human interaction to infect other devices.A worm can consume network bandwidth, slow down the system performance, or deliver a malicious payload, such as ransomware or a backdoor123.Reference:Types of Malware & Malware Examples - Kaspersky,10 types of malware + how to prevent malware from the start,Computer worm - Wikipedia

A worm replicates through the network while a virus replicates, not necessarily to spread through the network.

From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?

A.
Unit 52
A.
Unit 52
Answers
B.
PAN-DB
B.
PAN-DB
Answers
C.
BrightCloud
C.
BrightCloud
Answers
D.
MineMeld
D.
MineMeld
Answers
Suggested answer: B

Explanation:

When you enable URL Filtering, all web traffic is compared against the URL Filtering database, PAN-DB, which contains millions of URLs that have been grouped into about 65 categories.

Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?

A.
User-ID
A.
User-ID
Answers
B.
Lightweight Directory Access Protocol (LDAP)
B.
Lightweight Directory Access Protocol (LDAP)
Answers
C.
User and Entity Behavior Analytics (UEBA)
C.
User and Entity Behavior Analytics (UEBA)
Answers
D.
Identity and Access Management (IAM)
D.
Identity and Access Management (IAM)
Answers
Suggested answer: D

Explanation:

Identity and access management (IAM) is a software service or framework that allows organizations to define user or group identities within software environments, then associate permissions with them. The identities and permissions are usually spelled out in a text file, which is referred to as an IAM policy.

Which pillar of Prisma Cloud application security does vulnerability management fall under?

A.
dynamic computing
A.
dynamic computing
Answers
B.
identity security
B.
identity security
Answers
C.
compute security
C.
compute security
Answers
D.
network protection
D.
network protection
Answers
Suggested answer: C

Explanation:

Prisma Cloud comprises four pillars:

Visibility, governance, and compliance. Gain deep visibility into the security posture of multicloud environments. Track everything that gets deployed with an automated asset inventory, and maintain compliance with out-of-the-box governance policies that enforce good behavior across your environments.

Compute security. Secure hosts, containers, and serverless workloads throughout the application lifecycle. Detect and prevent risks by integrating vulnerability intelligence into your integrated development environment (IDE), software configuration management

(SCM), and CI/CD workflows. Enforce machine learning-based runtime protection to protect applications and workloads in real time.

Network protection. Continuously monitor network activity for anomalous behavior, enforce microservice-aware micro-segmentation, and implement industry-leading firewall protection. Protect the network perimeter and the connectivity between containers and hosts.

Identity security. Monitor and leverage user and entity behavior analytics (UEBA) across your environments to detect and block malicious actions. Gain visibility into and enforce governance p

What is used to orchestrate, coordinate, and control clusters of containers?

A.
Kubernetes
A.
Kubernetes
Answers
B.
Prisma Saas
B.
Prisma Saas
Answers
C.
Docker
C.
Docker
Answers
D.
CN-Series
D.
CN-Series
Answers
Suggested answer: A

Explanation:

As containers grew in popularity and used diversified orchestrators such as Kubernetes (and its derivatives, such as OpenShift), Mesos, and Docker Swarm, it became increasingly important to deploy and operate containers at scale.

https://www.dynatrace.com/news/blog/kubernetes-vs-docker/

Under which category does an application that is approved by the IT department, such as Office 365, fall?

A.
unsanctioned
A.
unsanctioned
Answers
B.
prohibited
B.
prohibited
Answers
C.
tolerated
C.
tolerated
Answers
D.
sanctioned
D.
sanctioned
Answers
Suggested answer: D

Explanation:

A sanctioned application is an application that is approved by the IT department and meets the security and compliance requirements of the organization. Sanctioned applications are allowed to access the organization's network and data and are monitored and protected by the IT department. Examples of sanctioned applications are Office 365, Salesforce, and Zoom. Sanctioned applications are different from unsanctioned, prohibited, and tolerated applications, which are not approved by the IT department and may pose security risks to the organization. Unsanctioned applications are applications that are used by the employees without the IT department's knowledge or consent, such as Dropbox, Gmail, or Facebook. Prohibited applications are applications that are explicitly forbidden by the IT department, such as BitTorrent, Tor, or malware. Tolerated applications are applications that are not approved by the IT department, but are not blocked or restricted, such as Skype, Spotify, or YouTube.Reference:Palo Alto Networks Certified Cybersecurity Entry-level Technician (PCCET),Cloud Security Fundamentals - Module 4: Cloud Security Best Practices,Application Visibility and Control

What are three benefits of SD-WAN infrastructure? (Choose three.)

A.
Improving performance of SaaS applications by requiring all traffic to be back-hauled through the corporate headquarters network
A.
Improving performance of SaaS applications by requiring all traffic to be back-hauled through the corporate headquarters network
Answers
B.
Promoting simplicity through the utilization of a centralized management structure
B.
Promoting simplicity through the utilization of a centralized management structure
Answers
C.
Utilizing zero-touch provisioning for automated deployments
C.
Utilizing zero-touch provisioning for automated deployments
Answers
D.
Leveraging remote site routing technical support by relying on MPLS
D.
Leveraging remote site routing technical support by relying on MPLS
Answers
E.
Improving performance by allowing efficient access to cloud-based resources without requiring back-haul traffic to a centralized location
E.
Improving performance by allowing efficient access to cloud-based resources without requiring back-haul traffic to a centralized location
Answers
Suggested answer: B, C, E

Explanation:

Simplicity: Because each device is centrally managed, with routing based on application policies, WAN managers can create and update security rules in real time as network requirements change. Also, when SD-WAN is combined with zero-touch provisioning, a feature that helps automate the deployment and configuration processes, organizations can further reduce the complexity, resources, and operating expenses required to spin up new sites. Improved performance: By allowing efficient access to cloud-based resources without the need to backhaul traffic to centralized locations, organizations can provide a better user experience.

Total 159 questions
Go to page: of 16