Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: cramtreat

PCCET Palo Alto Networks Certified Cybersecurity Entry-level Technician Questions and Answers

Questions 4

Which network analysis tool can be used to record packet captures?

Options:

A.

Smart IP Scanner

B.

Wireshark

C.

Angry IP Scanner

D.

Netman

Buy Now
Questions 5

Which element of the security operations process is concerned with using external functions to help achieve goals?

Options:

A.

interfaces

B.

business

C.

technology

D.

people

Buy Now
Questions 6

Given the graphic, match each stage of the cyber-attack lifecycle to its description.

Options:

Buy Now
Questions 7

Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?

Options:

A.

Session, Transport, Network

B.

Application, Presentation, and Session

C.

Physical, Data Link, Network

D.

Data Link, Session, Transport

Buy Now
Questions 8

Why is it important to protect East-West traffic within a private cloud?

Options:

A.

All traffic contains threats, so enterprises must protect against threats across the entire network

B.

East-West traffic contains more session-oriented traffic than other traffic

C.

East-West traffic contains more threats than other traffic

D.

East-West traffic uses IPv6 which is less secure than IPv4

Buy Now
Questions 9

Which type of malware takes advantage of a vulnerability on an endpoint or server?

Options:

A.

technique

B.

patch

C.

vulnerability

D.

exploit

Buy Now
Questions 10

Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?

Options:

A.

Benign

B.

Tolerated

C.

Sanctioned

D.

Secure

Buy Now
Questions 11

What does SOAR technology use to automate and coordinate workflows?

Options:

A.

algorithms

B.

Cloud Access Security Broker

C.

Security Incident and Event Management

D.

playbooks

Buy Now
Questions 12

What is the recommended method for collecting security logs from multiple endpoints?

Options:

A.

Leverage an EDR solution to request the logs from endpoints.

B.

Connect to the endpoints remotely and download the logs.

C.

Configure endpoints to forward logs to a SIEM.

D.

Build a script that pulls down the logs from all endpoints.

Buy Now
Questions 13

What is the definition of a zero-day threat?

Options:

A.

The amount of time it takes to discover a vulnerability and release a security fix

B.

The period between the discovery of a vulnerability and development and release of a patch

C.

The day a software vendor becomes aware of an exploit and prevents any further hacking

D.

A specific day during which zero threats occurred

Buy Now
Questions 14

What is the purpose of SIEM?

Options:

A.

Securing cloud-based applications

B.

Automating the security team’s incident response

C.

Real-time monitoring and analysis of security events

D.

Filtering webpages employees are allowed to access

Buy Now
Questions 15

What should a security operations engineer do if they are presented with an encoded string during an incident investigation?

Options:

A.

Save it to a new file and run it in a sandbox.

B.

Run it against VirusTotal.

C.

Append it to the investigation notes but do not alter it.

D.

Decode the string and continue the investigation.

Buy Now
Questions 16

Which statement is true about advanced persistent threats?

Options:

A.

They use script kiddies to carry out their attacks.

B.

They have the skills and resources to launch additional attacks.

C.

They lack the financial resources to fund their activities.

D.

They typically attack only once.

Buy Now
Questions 17

Which aspect of a SaaS application requires compliance with local organizational security policies?

Options:

A.

Types of physical storage media used

B.

Data-at-rest encryption standards

C.

Acceptable use of the SaaS application

D.

Vulnerability scanning and management

Buy Now
Questions 18

In the network diagram below, which device is the router?

Options:

A.

A

B.

C

C.

D

D.

B

Buy Now
Questions 19

Match each tunneling protocol to its definition.

Options:

Buy Now
Questions 20

Why have software developers widely embraced the use of containers?

Options:

A.

Containers require separate development and production environments to promote authentic code.

B.

Containers share application dependencies with other containers and with their host computer.

C.

Containers simplify the building and deploying of cloud native applications.

D.

Containers are host specific and are not portable across different virtual machine hosts.

Buy Now
Questions 21

Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use case?

Options:

A.

Cortex XSOAR

B.

Prisma Cloud

C.

AutoFocus

D.

Cortex XDR

Buy Now
Questions 22

An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?

Requirements for the three subnets: Subnet 1: 3 host addresses

Subnet 2: 25 host addresses

Subnet 3: 120 host addresses

Options:

A.

192.168.6.168/30

B.

192.168.6.0/25

C.

192.168.6.160/29

D.

192.168.6.128/27

Buy Now
Questions 23

What is a key benefit of Cortex XDR?

Options:

A.

It acts as a safety net during an attack while patches are developed.

B.

It secures internal network traffic against unknown threats.

C.

It manages applications accessible on endpoints.

D.

It reduces the need for network security.

Buy Now
Questions 24

A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?

Options:

A.

whaling

B.

phishing

C.

pharming

D.

spam

Buy Now
Questions 25

Match each description to a Security Operating Platform key capability.

Options:

Buy Now
Questions 26

At which layer of the OSI model are routing protocols defined?

Options:

A.

Network

B.

Physical

C.

Transport

D.

Data Link

Buy Now
Questions 27

Match the IoT connectivity description with the technology.

Options:

Buy Now
Questions 28

You have been invited to a public cloud design and architecture session to help deliver secure east west flows and secure Kubernetes workloads.

What deployment options do you have available? (Choose two.)

Options:

A.

PA-Series

B.

VM-Series

C.

Panorama

D.

CN-Series

Buy Now
Questions 29

In addition to local analysis, what can send unknown files to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?

Options:

A.

Cortex XDR

B.

AutoFocus

C.

MineMild

D.

Cortex XSOAR

Buy Now
Questions 30

In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?

Options:

A.

the network is large

B.

the network is small

C.

the network has low bandwidth requirements

D.

the network needs backup routes

Buy Now
Questions 31

On which security principle does virtualization have positive effects?

Options:

A.

integrity

B.

confidentiality

C.

availability

D.

non-repudiation

Buy Now
Questions 32

Match the Palo Alto Networks WildFire analysis verdict with its definition.

Options:

Buy Now
Questions 33

Which core component is used to implement a Zero Trust architecture?

Options:

A.

VPN Concentrator

B.

Content Identification

C.

Segmentation Platform

D.

Web Application Zone

Buy Now
Questions 34

With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?

Options:

A.

container, code, cluster, cloud

B.

code, container, cluster, cloud

C.

code, container, cloud, cluster

D.

container, code, cloud, cluster

Buy Now
Questions 35

What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?

Options:

A.

run a static analysis

B.

check its execution policy

C.

send the executable to WildFire

D.

run a dynamic analysis

Buy Now
Questions 36

Which activities do local organization security policies cover for a SaaS application?

Options:

A.

how the data is backed up in one or more locations

B.

how the application can be used

C.

how the application processes the data

D.

how the application can transit the Internet

Buy Now
Questions 37

Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)

Options:

A.

Birthplace

B.

Login 10

C.

Profession

D.

Name

Buy Now
Questions 38

Which action must Secunty Operations take when dealing with a known attack?

Options:

A.

Document, monitor, and track the incident.

B.

Limit the scope of who knows about the incident.

C.

Increase the granularity of the application firewall.

D.

Disclose details of lhe attack in accordance with regulatory standards.

Buy Now
Questions 39

During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack adds source (sender) and destination (receiver) IP addresses?

Options:

A.

Frame

B.

Segment

C.

Packet

D.

Data

Buy Now
Questions 40

Match the DNS record type to its function within DNS.

Options:

Buy Now
Questions 41

Which type of LAN technology is being displayed in the diagram?

Options:

A.

Star Topology

B.

Spine Leaf Topology

C.

Mesh Topology

D.

Bus Topology

Buy Now
Questions 42

Which characteristic of serverless computing enables developers to quickly deploy application code?

Options:

A.

Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand

B.

Uploading the application code itself, without having to provision a full container image or any OS virtual machine components

C.

Using cloud service spot pricing to reduce the cost of using virtual machines to run their application code

D.

Using Container as a Service (CaaS) to deploy application containers to run their code.

Buy Now
Questions 43

Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?

Options:

A.

Group policy

B.

Stateless

C.

Stateful

D.

Static packet-filter

Buy Now
Questions 44

Which subnet does the host 192.168.19.36/27 belong?

Options:

A.

192.168.19.0

B.

192.168.19.16

C.

192.168.19.64

D.

192.168.19.32

Buy Now
Questions 45

Order the OSI model with Layer7 at the top and Layer1 at the bottom.

Options:

Buy Now
Questions 46

Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?

Options:

A.

Use of non-standard ports

B.

Hiding within SSL encryption

C.

Port hopping

D.

Tunneling within commonly used services

Buy Now
Questions 47

Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?

Options:

A.

Routing Information Protocol (RIP)

B.

Border Gateway Protocol (BGP)

C.

Open Shortest Path First (OSPF)

D.

Split horizon

Buy Now
Exam Code: PCCET
Exam Name: Palo Alto Networks Certified Cybersecurity Entry-level Technician
Last Update: May 4, 2024
Questions: 158
PCCET pdf

PCCET PDF

$28  $80
PCCET Engine

PCCET Testing Engine

$33.25  $95
PCCET PDF + Engine

PCCET PDF + Testing Engine

$45.5  $130