Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with Dumpstech

Exam Practitioner Premium Access

View all detail and faqs for the Practitioner exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions
Questions # 51:

A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.

Which type of phishing attack does this represent?

Options:

A.

Whaling

B.

Vishing

C.

Pharming

D.

Angler phishing

Questions # 52:

Which term describes establishment of on-premises software on a cloud-based server?

Options:

A.

Serverless

B.

Dockers

C.

Cloud-hosted

D.

Kubernetes

Questions # 53:

Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?

Options:

A.

User-ID

B.

Device-ID

C.

App-ID

D.

Content-ID

Questions # 54:

An administrator finds multiple gambling websites in the network traffic log.

What can be created to dynamically block these websites?

Options:

A.

URL category

B.

Custom signatures

C.

Decryption policy

D.

Application group

Questions # 55:

Which component of the AAA framework verifies user identities so they may access the network?

Options:

A.

Allowance

B.

Authorization

C.

Accounting

D.

Authentication

Questions # 56:

Which endpoint protection security option can prevent malware from executing software?

Options:

A.

Application allow list

B.

DNS Security

C.

URL filtering

D.

Dynamic access control

Questions # 57:

Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?

Options:

A.

Cyber threat protection

B.

Inspection of all traffic

C.

Least privileges access control

D.

Network segmentation

Questions # 58:

Which architecture model uses virtual machines (VMs) in a public cloud environment?

Options:

A.

Kubernetes

B.

Serverless

C.

Docker

D.

Host-based

Questions # 59:

How does adopting a serverless model impact application development?

Options:

A.

costs more to develop application code because it uses more compute resources

B.

slows down the deployment of application code, but it improves the quality of code development

C.

reduces the operational overhead necessary to deploy application code

D.

prevents developers from focusing on just the application code because you need to provision the underlying infrastructure to run the code

Questions # 60:

On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?

Options:

A.

operating system patches

B.

full-disk encryption

C.

periodic data backups

D.

endpoint-based firewall

Viewing page 6 out of 7 pages
Viewing questions 51-60 out of questions