Palo Alto Networks PCCET Practice Test - Questions Answers, Page 9

List of questions
Question 81

Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Question 82

A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?
Question 83

With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
Question 84

Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?
Question 85

Which attacker profile acts independently or as part of an unlawful organization?
Question 86

Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
Question 87

What is the recommended method for collecting security logs from multiple endpoints?
Question 88

What does ''forensics'' refer to in a Security Operations process?
Question 89

If an endpoint does not know how to reach its destination, what path will it take to get there?
Question 90

A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.
Which NIST cloud service model is this?
Question