PA PCCET Study Guide Questions With Correct Answers.
6 views 0 purchase
Module
PCCET
Institution
PCCET
PA PCCET Study Guide Questions With
Correct Answers.
True or False: Business intelligence (BI) software consists of tools and techniques used to
surface large amounts of raw unstructured data to perform a variety of tasks, including data
mining, event processing, and predictive analytics. - ans...
pa pccet study guide questions with correct answer
Written for
PCCET
PCCET
Seller
Follow
Brightstars
Content preview
BRIGHTSTARS EXAM STUDY SOLUTIONS 8/15/2024 2:05 PM
PA PCCET Study Guide Questions With
Correct Answers.
True or False: Business intelligence (BI) software consists of tools and techniques used to
surface large amounts of raw unstructured data to perform a variety of tasks, including data
mining, event processing, and predictive analytics. - answer✔✔True
True or False: The process in which end users find personal technology and apps that are more
powerful or capable, more convenient, less expensive, quicker to install, and easier to use than
enterprise IT solutions is known as consumerization. - answer✔✔True
Which action is associated with Web 1.0? - answer✔✔checking CNN's website for news
Which action is associated with Web 3.0? - answer✔✔asking Apple's Siri a question
Gmail is associated with which cloud computing model? - answer✔✔SaaS
Which two port numbers are associated with HTTP? (Choose two.) - answer✔✔80, 8080
Which port number is associated with HTTPS? - answer✔✔443
Which port is used for encrypted communication? - answer✔✔22
Which protocol distinguishes between applications using port numbers? - answer✔✔TCP
How do attackers prevent port scans from being noticed by monitoring software? -
answer✔✔Scan ports so quickly it is finished before it can be detected and stopped
Which potentially risky attribute is the most serious? - answer✔✔Malware
Which one of these applications can be used as a tunnel for other applications? - answer✔✔SSH
Which two devices or systems require the configuration of non-standard ports to be able to use
an application on a non-standard port? (Choose two.) - answer✔✔Client, Server
If you are responsible for the application's security, but not the operating system's security,
which cloud computing service model are you using? - answer✔✔PaaS
, BRIGHTSTARS EXAM STUDY SOLUTIONS 8/15/2024 2:05 PM
Which kind of security always is the responsibility of the cloud customer? - answer✔✔Data
Security
Where is your data typically stored in a SaaS application? - answer✔✔in the cloud, in a database
controlled by the SaaS provider
Who is responsible for the security settings in an enterprise SaaS application? (choose the best
answer) - answer✔✔Both IT administrators and users
When is it impossible to secure SaaS data? - answer✔✔when a user uses an unmanaged device
to access an unsanctioned SaaS
True or False. An organization can be compliant with all applicable security and privacy
regulations for its industry yet still not be secure. - answer✔✔True
Which three data fields are considered personally identifiable information (PII)? (select three) -
answer✔✔unique identification number (such as driver's license number), phone number,
fingerprints
Which risk is eliminated in an organization that is 100% compliant? - answer✔✔having the
regulator punish you for being non-compliant
What does CVE mean? - answer✔✔Common Vulnerabilities and Exposures
What is the difference between CVE and CVSS? - answer✔✔CVE tells you what the
vulnerabilities are. CVSS gives vulnerabilities a score (0- 10) to evaluate how serious they are.
True or False. External threat actors have accounted for the majority of data breaches over the
past five years. - answer✔✔True
Which group is likely to attack indiscriminately, whether you are a valuable target or not? -
answer✔✔Cyberterrorists
Which group is primarily motivated by money? - answer✔✔Cybercriminals
True or False: The cyberattack lifecycle is a seven-step process. - answer✔✔True
True or False: An attacker needs to succeed in executing only one step of the cyberattack
lifecycle to infiltrate a network, whereas a defender must "be right every time" and break every
step of the chain to prevent an attack. - answer✔✔False
True or False: The key to breaking the cyberattack lifecycle during the Installation phase is to
implement network segmentation, a Zero Trust model, and granular control of applications to
limit or restrict an attacker's lateral movement within the network. - answer✔✔True
Which stage of the cyberattack lifecycle can be identified by port scans from external sources? -
answer✔✔Reconnaissance
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Brightstars. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £10.18. You're not tied to anything after your purchase.