Palo Alto Networks Cybersecurity Practitioner v1.0

Page:    1 / 5   
Exam contains 70 questions

Which action is unique to the security orchestration, automation, and response (SOAR) platforms?

  • A. Prioritizing alerts
  • B. Enhancing data collection
  • C. Using predefined workflows
  • D. Correlating incident data


Answer : C

Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)

  • A. Detection of threats using data analysis
  • B. Automation of security deployments
  • C. Ingestion of log data
  • D. Prevention of cybersecurity attacks


Answer : AC

Which Palo Alto Networks solution has replaced legacy IPS solutions?

  • A. Advanced DNS Security
  • B. Advanced WildFire
  • C. Advanced Threat Prevention
  • D. Advanced URL Filtering


Answer : C

Which type of system is a user entity behavior analysis (UEBA) tool?

  • A. Correlating
  • B. Active monitoring
  • C. Archiving
  • D. Sandboxing


Answer : B

What is a function of SSL/TLS decryption?

  • A. It applies to unknown threat detection only.
  • B. It reveals malware within web-based traffic.
  • C. It protects users from social engineering.
  • D. It identifies IoT devices on the internet.


Answer : B

Which feature is part of an intrusion prevention system (IPS)?

  • A. API-based coverage of apps
  • B. Automated security actions
  • C. Protection of data at rest
  • D. Real-time web filtering


Answer : B

What are two capabilities of identity threat detection and response (ITDR)? (Choose two.)

  • A. Securing individual devices
  • B. Matching risks to signatures
  • C. Scanning for excessive logins
  • D. Analyzing access management logs


Answer : CD

Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?

  • A. DDoS
  • B. DNS tunneling
  • C. Command-and-control (C2)
  • D. Port evasion


Answer : B

Which service is encompassed by serverless architecture?

  • A. Infrastructure as a Service (IaaS)
  • B. Function as a Service (FaaS)
  • C. Security as a Service (SaaS)
  • D. Authentication as a Service (AaaS)


Answer : B

Which architecture model uses virtual machines (VMs) in a public cloud environment?

  • A. Kubernetes
  • B. Serverless
  • C. Docker
  • D. Host-based


Answer : D

Which two statements apply to SaaS financial botnets? (Choose two.)

  • A. They are larger than spamming or DDoS botnets.
  • B. They are sold as kits that allow attackers to license the code.
  • C. They are a defense against spam attacks.
  • D. They are used by attackers to build their own botnets.


Answer : BD

What is an event-driven snippet of code that runs on managed infrastructure?

  • A. API
  • B. Serverless function
  • C. Hypervisor
  • D. Docker container


Answer : B

Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?

  • A. Advanced malware
  • B. Smishing
  • C. Reconnaissance
  • D. Denial of service


Answer : A

What is a dependency for the functionality of signature-based malware detection?

  • A. Frequent database updates
  • B. Support of a DLP device
  • C. API integration with a sandbox
  • D. Enabling quality of service


Answer : A

When does a TLS handshake occur?

  • A. Before establishing a TCP connection
  • B. Only during DNS over HTTPS queries
  • C. After a TCP handshake has been established
  • D. Independently of HTTPS communications


Answer : C

Page:    1 / 5   
Exam contains 70 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy