Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with Dumpstech

Exam Practitioner Premium Access

View all detail and faqs for the Practitioner exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which type of malware replicates itself to spread rapidly through a computer network?

Options:

A.

ransomware

B.

Trojan horse

C.

virus

D.

worm

Questions # 12:

Which action must Secunty Operations take when dealing with a known attack?

Options:

A.

Document, monitor, and track the incident.

B.

Limit the scope of who knows about the incident.

C.

Increase the granularity of the application firewall.

D.

Disclose details of lhe attack in accordance with regulatory standards.

Questions # 13:

Match the DNS record type to its function within DNS.

Question # 13

Options:

Questions # 14:

Which tool automates remediation of a confirmed cybersecurity breach?

Options:

A.

SIEM

B.

EDR

C.

SOAR

D.

ISIM

Questions # 15:

In the network diagram below, which device is the router?

Question # 15

Options:

A.

A

B.

C

C.

D

D.

B

Questions # 16:

What is the recommended method for collecting security logs from multiple endpoints?

Options:

A.

Leverage an EDR solution to request the logs from endpoints.

B.

Connect to the endpoints remotely and download the logs.

C.

Configure endpoints to forward logs to a SIEM.

D.

Build a script that pulls down the logs from all endpoints.

Questions # 17:

Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?

Options:

A.

Network

B.

Management

C.

Cloud

D.

Security

Questions # 18:

Why have software developers widely embraced the use of containers?

Options:

A.

Containers require separate development and production environments to promote authentic code.

B.

Containers share application dependencies with other containers and with their host computer.

C.

Containers simplify the building and deploying of cloud native applications.

D.

Containers are host specific and are not portable across different virtual machine hosts.

Questions # 19:

What would allow a security team to inspect TLS encapsulated traffic?

Options:

A.

DHCP markings

B.

Decryption

C.

Port translation

D.

Traffic shaping

Questions # 20:

Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?

Options:

A.

Personal endpoint firewall

B.

Port-based firewall

C.

Next-generation firewall

D.

Stateless firewall

Viewing page 2 out of 7 pages
Viewing questions 11-20 out of questions