PCCET EXAM QUESTIONS AND ANSWERS 2024 NEW UPDATE
What is the common protocol for accessing a directory?
a. DAP
b. LDAP
c. SLAP
d. SLDAP - Answer-b. LDAP
. Which action is part of the compute cloud governance and compliance pillar?
a. User and entity behavior analytics (UEBA)
b. Microser...
PCCET EXAM QUESTIONS
AND ANSWERS 2024 NEW
UPDATE
What is the common protocol for accessing a directory?
a. DAP
b. LDAP
c. SLAP
d. SLDAP - Answer-b. LDAP
. Which action is part of the compute cloud governance and compliance pillar?
a. User and entity behavior analytics (UEBA)
b. Microservice-aware micro-segmentation
c. Integration with the CI/CD workflow
d. Automated asset inventory - Answer-c. Integration with the CI/CD workflow
Which action is part of the identity security pillar?
a. User and entity behavior analytics (UEBA)
b. Microservice-aware micro-segmentation
c. Integration with the CI/CD workflow
d. Automated asset inventory - Answer-d. Automated asset inventory
Which action is part of the network security pillar?
a. User and entity behavior analytics (UEBA)
b. Microservice-aware micro-segmentation
c. Integration with the CI/CD workflow
d. Automated asset inventory - Answer-a. User and entity behavior analytics (UEBA
Containers-as-a Service platforms are highly optimized for what type of workloads?
a. Any type of workloads
b. Container workloads
c. Non-containerized workloads
d. Serverless workloads - Answer-b. Container workloads
List three advantages of serverless computing over CaaS. (Select three.)
a. Reduce costs
,b. Increase control over the workload
c. Increase ability to monitor and identify problems
d. Increase agility
e. Reduce operational overhead - Answer-a. Reduce costs
d. Increase agility
e. Reduce operational overhead
In the DevOps model, developers deliver small amounts of code for what type of
testing?
a. Integration testing
b. System testing
c. Unit testing
d. Continuous testing - Answer-d. Continuous testing
How can developers solve the DevOps security issue in DevSecOps? (Select two.)
a. They should solve down for security checks
b. They should work closely with the IT team
c. They should avoid security mistakes
d. They should integrate automated checks into CI/CD pipeline - Answer-b. They should
work closely with the IT team
d. They should integrate automated checks into CI/CD pipeline
What are the two meanings of the CI/CD pipeline? (Choose two.)
a. Continuous integration/continuous delivery
b. Continuous implementation/continuous delivery
c. Continuous integration/continuous deployment
d. Continuous implementation/continuous deployment
e. Continuous innovation/continuous development - Answer-a. Continuous
integration/continuous deliver
c. Continuous integration/continuous deployment
Which step of the CI/CD pipeline cannot be automated?
a. Coding
b. Integration
c. Testing
d. Monitoring - Answer-a. Coding
Which step of the CI/CD pipeline is the ideal place for automated penetration testing?
a. Coding
b. Integration
c. Testing
d. Deploymen - Answer-c. Testing
How would a port filter firewall classify access to the URL
https://example.com:22/this/page?
a. HTTP
, b. HTTPS
c. Telnet
d. SSH - Answer-d. SSH
Intra-VM traffic is also known as which type of traffic?
a. North-south
b. Unknown
c. East-west
d. Untrusted - Answer-c. East-west
What is the term for traffic between a website and a remote user's browser?
a. North-south
b. East-west
c. Unknown
d. Cloud - Answer-a. North-south
Systems used to store and organize files from a central management interface are
called what?
a. Enterprise resource planning
b. Customer relationship management
c. Business intelligence and business analytics software
d. Content management systems and enterprise content management - Answer-d.
Content management systems and enterprise content management
What should the Enterprise security team do to effectively protect their networks and
cloud
platform?
a. Manage the risks with limited known set of core applications
b. Manage the risk associated with number of known and unknown cloud-based
application
c. Both a and b
d. Only manage the latest threats - Answer-b. Manage the risk associated with number
of known and unknown cloud-based
In which cloud computing service model does a provider's applications run on a cloud
infrastructure and the consumer does not manage or control the underlying
infrastructure?
a. Platform as a service (PaaS)
b. Infrastructure as a service (IaaS)
c. Software as a service (SaaS)
d. Public cloud - Answer-a. Platform as a service (PaaS)
Which components do customers have control over in Infrastructure-as-a-service
model? (Select
two.)
a. Limited applications
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.99. You're not tied to anything after your purchase.