PANW PCCET Exam Questions With
Correct Answers.
When is it impossible to secure SaaS data? - answerwhen a user uses an unmanaged device
to access an unsanctioned SaaS instance
Which option is an example of a static routing protocol? - answerBorder Gateway Protocol
(BGP)
Which two malware type...
BRIGHTSTARS EXAM STUDY SOLUTIONS 8/15/2024 2:05 PM
PANW PCCET Exam Questions With
Correct Answers.
When is it impossible to secure SaaS data? - answer✔✔when a user uses an unmanaged device
to access an unsanctioned SaaS instance
Which option is an example of a static routing protocol? - answer✔✔Border Gateway Protocol
(BGP)
Which two malware types are self-replicating? (Choose two) - answer✔✔Virus, worm
Which types of attack includes an email advertisement for a dry cleaning service? -
answer✔✔Spamming
Who is the most likely target of social engineering? - answer✔✔Junior people, because they are
easier to stress and probably not as well trained
Which two attacks typically use a botnet? - answer✔✔DDoS, sending spam to a lengthy mailing
list
An analysis tool raised an alert, but the security analyst who researched it discovered it wasn't a
problem. Which type of finding is this? - answer✔✔False positive
Which PANW product suite is used to manage alerts, obtain additional information and
orchestrate responses? - answer✔✔Cortex
Which stage of the cyber attack lifecycle makes it important to provide ongoing education to
users on spear phishing links, unknown emails, and risky websites? - answer✔✔Delivery
Which DNS record type do you use to find the IPv4 address of a host? - answer✔✔A
Which device is M2M (machine to machine)? - answer✔✔Temperature sensor connected to a
fire suppression system
How many bytes are in an IPv6 address? - answer✔✔16
Which three security functions are integrated with a UTM device? - answer✔✔Firewall,
Intrusion Detection System (IDS), anti-spam
, BRIGHTSTARS EXAM STUDY SOLUTIONS 8/15/2024 2:05 PM
Which type of malware protection requires in-depth knowledge of applications and how they
communicate? - answer✔✔container-based
Which item accurately describes a security weakness that is caused by implementing a "ports-
first" data security solution in a traditional data center? - answer✔✔You may have to open up
multiple ports and these ports could also be used to gain unauthorised entry to your datacenter.
Which feature of the NGFW can distinguish between reading Facebook and commenting? -
answer✔✔App-ID
What is the collective term for software versions, OS settings, and configuration file settings? -
answer✔✔Configuration items
A provider's applications run on a cloud infrastructure. The consumer does not manage or control
the underlying infrastructure, Which cloud computing service model is this? -
answer✔✔Platform as a service (PaaS)
Which NIST cloud deployment model would you recommend for a startup that does not have
much money to pay for hosting or a data centre and needs a 24/7 server? - answer✔✔public
Which component may be shared with other cloud tenants even when using IaaS? -
answer✔✔physical machine
Which of the following security issues can cause a long patched vulnerability to resurface? -
answer✔✔dormant virtual machines
What are the two meanings of the CI/CD pipeline? - answer✔✔Continuous
integration/continuous delivery; continuous integration/ continuous deployment
Which systems must you secure to ensure compliance with security standards? - answer✔✔Any
system where the data for which you are responsible goes
Which action is part of the compute security pillar? - answer✔✔integration with the CI/CD flow
Which action is part of the identity security pillar? - answer✔✔user and entity behaviour
analytics (UEBA)
Which type of traffic can stay contained in a single physical server? - answer✔✔East-west
Why is it important to protect East-West traffic within a private cloud? - answer✔✔All traffic
contains threats, so enterprises must protect against threats across the entire network
Which option is a Prisma Access security device? - answer✔✔firewall as a service (FWaaS)
Which SecOp function is proactive? - answer✔✔Improve
Which environment allows you to install an appliance that sees all traffic? - answer✔✔Non-
virtualized data center
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Brightstars. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.