New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the Paloalto Networks Certified Cybersecurity Associate Practitioner Questions and answers with Dumpstech

Exam Practitioner Premium Access

View all detail and faqs for the Practitioner exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two statements describe the Jasager attack? (Choose two.)

Options:

A.

□ The victim must manually choose the attacker s access point

B.

□ It actively responds to beacon reguests.

C.

□ It tries to get victims to conned at random.

D.

□ The attacker needs to be wilhin close proximity of the victim.

Questions # 2:

What does SOAR technology use to automate and coordinate workflows?

Options:

A.

algorithms

B.

Cloud Access Security Broker

C.

Security Incident and Event Management

D.

playbooks

Questions # 3:

Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?

Options:

A.

Knowledge-based

B.

Signature-based

C.

Behavior-based

D.

Database-based

Questions # 4:

Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?

Options:

A.

API

B.

Code security

C.

Virtualization

D.

IRP

Questions # 5:

Which IoT connectivity technology is provided by satellites?

Options:

A.

4G/LTE

B.

VLF

C.

L-band

D.

2G/2.5G

Questions # 6:

Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?

Options:

A.

CSPM

B.

ASM

C.

EDR

D.

CVVP

Questions # 7:

How does Prisma SaaS provide protection for Sanctioned SaaS applications?

Options:

A.

Prisma SaaS connects to an organizations internal print and file sharing services to provide protection and sharing visibility

B.

Prisma SaaS does not provide protection for Sanctioned SaaS applications because they are secure

C.

Prisma access uses Uniform Resource Locator (URL) Web categorization to provide protection and sharing visibility

D.

Prisma SaaS connects directly to sanctioned external service providers SaaS application service to provide protection and sharing visibility

Questions # 8:

What are two capabilities of identity threat detection and response (ITDR)? (Choose two.)

Options:

A.

Securing individual devices

B.

Matching risks to signatures

C.

Scanning for excessive logins

D.

Analyzing access management logs

Questions # 9:

Which type of malware takes advantage of a vulnerability on an endpoint or server?

Options:

A.

technique

B.

patch

C.

vulnerability

D.

exploit

Questions # 10:

Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?

Options:

A.

Session, Transport, Network

B.

Application, Presentation, and Session

C.

Physical, Data Link, Network

D.

Data Link, Session, Transport

Viewing page 1 out of 7 pages
Viewing questions 1-10 out of questions