Palo Alto Networks Certified Cybersecurity Entry-level Technician v1.0

Page:    1 / 17   
Exam contains 259 questions

Which TCP/IP sub-protocol operates at the Layer7 of the OSI model?

  • A. UDP
  • B. MAC
  • C. SNMP
  • D. NFS


Answer : C

Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?

  • A. an intranet-accessed contractorג€™s system that was compromised
  • B. exploitation of an unpatched security vulnerability
  • C. access by using a third-party vendorג€™s password
  • D. a phishing scheme that captured a database administratorג€™s password


Answer : D

Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?

  • A. Shortest Path
  • B. Hop Count
  • C. Split Horizon
  • D. Path Vector


Answer : B

Why is it important to protect East-West traffic within a private cloud?

  • A. All traffic contains threats, so enterprises must protect against threats across the entire network
  • B. East-West traffic contains more session-oriented traffic than other traffic
  • C. East-West traffic contains more threats than other traffic
  • D. East-West traffic uses IPv6 which is less secure than IPv4


Answer : A

Which IPsec feature allows device traffic to go directly to the Internet?

  • A. Split tunneling
  • B. Diffie-Hellman groups
  • C. d.Authentication Header (AH)
  • D. IKE Security Association


Answer : A

Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?

  • A. cybercriminals
  • B. state-affiliated groups
  • C. hacktivists
  • D. cyberterrorists


Answer : D

What are two key characteristics of a Type 1 hypervisor? (Choose two.)

  • A. is hardened against cyber attacks
  • B. runs without any vulnerability issues
  • C. runs within an operating system
  • D. allows multiple, virtual (or guest) operating systems to run concurrently on a single physical host computer


Answer : CD

The customer is responsible only for which type of security when using a SaaS application?

  • A. physical
  • B. platform
  • C. data
  • D. infrastructure


Answer : C

Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?

  • A. DNS Security
  • B. URL Filtering
  • C. WildFire
  • D. Threat Prevention


Answer : C

In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?

  • A. weaponization
  • B. reconnaissance
  • C. exploitation
  • D. delivery


Answer : D

Which endpoint tool or agent can enact behavior-based protection?

  • A. AutoFocus
  • B. Cortex XDR
  • C. DNS Security
  • D. MineMeld


Answer : B

Which tool supercharges security operations center (SOC) efficiency with the world's most comprehensive operating platform for enterprise security?

  • A. Prisma SAAS
  • B. WildFire
  • C. Cortex XDR
  • D. Cortex XSOAR


Answer : D

During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination
(receiver) IP addresses?

  • A. Frame
  • B. Segment
  • C. Packet
  • D. Data


Answer : C

Which core component is used to implement a Zero Trust architecture?

  • A. VPN Concentrator
  • B. Content Identification
  • C. Segmentation Platform
  • D. Web Application Zone


Answer : C

In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?

  • A. Cortex XDR
  • B. AutoFocus
  • C. MineMild
  • D. Cortex XSOAR


Answer : A

Page:    1 / 17   
Exam contains 259 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy