Paloalto Networks Practitioner Palo Alto Networks Cybersecurity Practitioner (PCCP) Exam Practice Test
Palo Alto Networks Cybersecurity Practitioner (PCCP) Questions and Answers
What are three benefits of the cloud native security platform? (Choose three.)
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?
A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?
In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?
What does SOAR technology use to automate and coordinate workflows?
Which statement describes advanced malware?
Which technology secures software-as-a-service (SaaS) applications and network data, and also enforces compliance policies for application access?
Which product from Palo Alto Networks enables organizations to prevent successful cyberattacks as well as simplify and strengthen security processes?
Which element of the security operations process is concerned with using external functions to help achieve goals?
What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
Which security function enables a firewall to validate the operating system version of a device before granting it network access?
Which type of LAN technology is being displayed in the diagram?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
Which two statements apply to SaaS financial botnets? (Choose two.)
Which core component is used to implement a Zero Trust architecture?
Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)
What is a function of SSL/TLS decryption?
Organizations that transmit, process, or store payment-card information must comply with what standard?
Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?
Which key component is used to configure a static route?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?
Which service is encompassed by serverless architecture?
Which statement describes a host-based intrusion prevention system (HIPS)?
In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
What is a key benefit of Cortex XDR?
An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
Requirements for the three subnets: Subnet 1: 3 host addresses
Subnet 2: 25 host addresses
Subnet 3: 120 host addresses
What protocol requires all routers in the same domain to maintain a map of the network?
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?
Which two descriptions apply to an XDR solution? (Choose two.)
What is the definition of a zero-day threat?
TCP is the protocol of which layer of the OSI model?
What differentiates Docker from a bare metal hypervisor?
Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?
Which component of cloud security is used to identify misconfigurations during the development process?
A native hypervisor runs:
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
What is a key advantage and key risk in using a public cloud environment?
Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Which of the following is an AWS serverless service?
Which technique changes protocols at random during a session?
With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
Match the DNS record type to its function within DNS.
Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?
Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?
Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
Layer 4 of the TCP/IP Model corresponds to which three Layer(s) of the OSI Model? (Choose three.)
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
In addition to integrating the network and endpoint components, what other component does Cortex integrate to speed up IoC investigations?
How does Prisma SaaS provide protection for Sanctioned SaaS applications?
What is a dependency for the functionality of signature-based malware detection?
Which network firewall primarily filters traffic based on source and destination IP address?
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
Which architecture model uses virtual machines (VMs) in a public cloud environment?
Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?
Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?
Which activities do local organization security policies cover for a SaaS application?
Which endpoint tool or agent can enact behavior-based protection?
Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?
Which component of the AAA framework regulates user access and permissions to resources?
What are three benefits of SD-WAN infrastructure? (Choose three.)
