Palo Alto PCCET Exam Questions and
Answers
When is it impossible to secure SaaS data?
When a user uses an unmanaged device to access an unsanctioned SaaS instance.
When a user uses a managed device to access an unsanctioned SaaS instance.
When a user uses an unmanaged device to access a sanctioned SaaS instance.
When a user uses a managed device to access a sanctioned SaaS instance. - Answer -
When a user uses an unmanaged device to access an unsanctioned SaaS instance.
Which group is primarily motivated by money?
hacktivists
cybercriminals
cyberterrorists
state-affiliated groups - Answer -Cybercriminals
Which two malware types are self-replicating? (Choose two.)
logic bomb
back door
virus
trojan horse
worm - Answer -Virus
Worm
Which type of attack includes an email advertisement for a dry cleaning service?
Who is the most likely target of social engineering?
Executive management, because it has the most permissions.
,Senior IT engineers, because the attacker hopes to get them to disable the security
infrastructure.
Junior people, because they are easier to stress and probably not as well trained.
The accounting department, because it can wire money directly to the attacker's
account. - Answer -Junior people, because they are easier to stress and probably not as
well trained.
Which two attacks typically use a botnet? (Choose two.)
Ssocial engineering
DoS
DDoS
Sending spam to a lengthy mailing list
Spear phishing - Answer -DDoS
Sending spam to a lengthy mailing list.
What is the name of the attack in which the attacker gets the victim to connect to an
access point the attack controls?
Person in the middle
Man in the middle
Access point in the middle
Access point masquerading - Answer -Man in the middle
Which Palo Alto Networks product suite is used to manage alerts, obtain additional
information, and orchestrate responses?
Which DNS record type do you use to find the IPv4 address of a host?
A
AAAA
PTR
MX - Answer -A
, Which device is M2M (machine to machine)?
Internet-connected TV
home alarm that dials the police for response
car GPS
temperature sensor connected to a fire suppression system - Answer -Temperature
sensor connected to a fire suppression system.
How many bytes are in an IPv6 address?
4
8
16
32 - Answer -16
Which three security functions are integrated with a UTM device? (Choose three.)
Which Panorama object is used to manage the security policy?
template
device group
virtual system
Decryption Profile - Answer -Device group
Which feature of the NGFW can distinguish between reading Facebook and
commenting?
App-ID
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur millyphilip. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €12,60. Vous n'êtes lié à rien après votre achat.