PCCET EXAM QUESTIONS AND ANSWERS 2024 NEW UPDATE
What is the common protocol for accessing a directory?
a. DAP
b. LDAP
c. SLAP
d. SLDAP - Answer-b. LDAP
. Which action is part of the compute cloud governance and compliance pillar?
a. User and entity behavior analytics (UEBA)
b. Microser...
PCCET EXAM QUESTIONS
AND ANSWERS 2024 NEW
UPDATE
What is the common protocol for accessing a directory?
a. DAP
b. LDAP
c. SLAP
d. SLDAP - Answer-b. LDAP
. Which action is part of the compute cloud governance and compliance pillar?
a. User and entity behavior analytics (UEBA)
b. Microservice-aware micro-segmentation
c. Integration with the CI/CD workflow
d. Automated asset inventory - Answer-c. Integration with the CI/CD workflow
Which action is part of the identity security pillar?
a. User and entity behavior analytics (UEBA)
b. Microservice-aware micro-segmentation
c. Integration with the CI/CD workflow
d. Automated asset inventory - Answer-d. Automated asset inventory
Which action is part of the network security pillar?
a. User and entity behavior analytics (UEBA)
b. Microservice-aware micro-segmentation
c. Integration with the CI/CD workflow
d. Automated asset inventory - Answer-a. User and entity behavior analytics (UEBA
Containers-as-a Service platforms are highly optimized for what type of workloads?
a. Any type of workloads
b. Container workloads
c. Non-containerized workloads
d. Serverless workloads - Answer-b. Container workloads
List three advantages of serverless computing over CaaS. (Select three.)
a. Reduce costs
,b. Increase control over the workload
c. Increase ability to monitor and identify problems
d. Increase agility
e. Reduce operational overhead - Answer-a. Reduce costs
d. Increase agility
e. Reduce operational overhead
In the DevOps model, developers deliver small amounts of code for what type of
testing?
a. Integration testing
b. System testing
c. Unit testing
d. Continuous testing - Answer-d. Continuous testing
How can developers solve the DevOps security issue in DevSecOps? (Select two.)
a. They should solve down for security checks
b. They should work closely with the IT team
c. They should avoid security mistakes
d. They should integrate automated checks into CI/CD pipeline - Answer-b. They should
work closely with the IT team
d. They should integrate automated checks into CI/CD pipeline
What are the two meanings of the CI/CD pipeline? (Choose two.)
a. Continuous integration/continuous delivery
b. Continuous implementation/continuous delivery
c. Continuous integration/continuous deployment
d. Continuous implementation/continuous deployment
e. Continuous innovation/continuous development - Answer-a. Continuous
integration/continuous deliver
c. Continuous integration/continuous deployment
Which step of the CI/CD pipeline cannot be automated?
a. Coding
b. Integration
c. Testing
d. Monitoring - Answer-a. Coding
Which step of the CI/CD pipeline is the ideal place for automated penetration testing?
a. Coding
b. Integration
c. Testing
d. Deploymen - Answer-c. Testing
How would a port filter firewall classify access to the URL
https://example.com:22/this/page?
a. HTTP
, b. HTTPS
c. Telnet
d. SSH - Answer-d. SSH
Intra-VM traffic is also known as which type of traffic?
a. North-south
b. Unknown
c. East-west
d. Untrusted - Answer-c. East-west
What is the term for traffic between a website and a remote user's browser?
a. North-south
b. East-west
c. Unknown
d. Cloud - Answer-a. North-south
Systems used to store and organize files from a central management interface are
called what?
a. Enterprise resource planning
b. Customer relationship management
c. Business intelligence and business analytics software
d. Content management systems and enterprise content management - Answer-d.
Content management systems and enterprise content management
What should the Enterprise security team do to effectively protect their networks and
cloud
platform?
a. Manage the risks with limited known set of core applications
b. Manage the risk associated with number of known and unknown cloud-based
application
c. Both a and b
d. Only manage the latest threats - Answer-b. Manage the risk associated with number
of known and unknown cloud-based
In which cloud computing service model does a provider's applications run on a cloud
infrastructure and the consumer does not manage or control the underlying
infrastructure?
a. Platform as a service (PaaS)
b. Infrastructure as a service (IaaS)
c. Software as a service (SaaS)
d. Public cloud - Answer-a. Platform as a service (PaaS)
Which components do customers have control over in Infrastructure-as-a-service
model? (Select
two.)
a. Limited applications
Les avantages d'acheter des résumés chez Stuvia:
Qualité garantie par les avis des clients
Les clients de Stuvia ont évalués plus de 700 000 résumés. C'est comme ça que vous savez que vous achetez les meilleurs documents.
L’achat facile et rapide
Vous pouvez payer rapidement avec iDeal, carte de crédit ou Stuvia-crédit pour les résumés. Il n'y a pas d'adhésion nécessaire.
Focus sur l’essentiel
Vos camarades écrivent eux-mêmes les notes d’étude, c’est pourquoi les documents sont toujours fiables et à jour. Cela garantit que vous arrivez rapidement au coeur du matériel.
Foire aux questions
Qu'est-ce que j'obtiens en achetant ce document ?
Vous obtenez un PDF, disponible immédiatement après votre achat. Le document acheté est accessible à tout moment, n'importe où et indéfiniment via votre profil.
Garantie de remboursement : comment ça marche ?
Notre garantie de satisfaction garantit que vous trouverez toujours un document d'étude qui vous convient. Vous remplissez un formulaire et notre équipe du service client s'occupe du reste.
Auprès de qui est-ce que j'achète ce résumé ?
Stuvia est une place de marché. Alors, vous n'achetez donc pas ce document chez nous, mais auprès du vendeur Scholarsstudyguide. Stuvia facilite les paiements au vendeur.
Est-ce que j'aurai un abonnement?
Non, vous n'achetez ce résumé que pour €12,71. Vous n'êtes lié à rien après votre achat.