palo-alto-networks pccet practice test

Palo Alto Networks Certified Cybersecurity Entry-level Technician


Question 1

How does Prisma SaaS provide protection for Sanctioned SaaS applications?

  • A. Prisma SaaS connects to an organizations internal print and file sharing services to provide protection and sharing visibility
  • B. Prisma SaaS does not provide protection for Sanctioned SaaS applications because they are secure
  • C. Prisma access uses Uniform Resource Locator (URL) Web categorization to provide protection and sharing visibility
  • D. Prisma SaaS connects directly to sanctioned external service providers SaaS application service to provide protection and sharing visibility
Answer:

D

Discussions

Question 2

What is a key advantage and key risk in using a public cloud environment?

  • A. Multi-tenancy
  • B. Dedicated Networks
  • C. Dedicated Hosts
  • D. Multiplexing
Answer:

A

Discussions

Question 3

A native hypervisor runs:

  • A. with extreme demands on network throughput
  • B. only on certain platforms
  • C. within an operating system’s environment
  • D. directly on the host computer’s hardware
Answer:

D

Discussions

Question 4

During the OSI layer 3 step of the encapsulation process, what is the Protocol Data Unit (PDU) called when the IP stack
adds source (sender) and destination (receiver) IP addresses?

  • A. Frame
  • B. Segment
  • C. Packet
  • D. Data
Answer:

C

Discussions

Question 5

Which Palo Alto Networks product provides playbooks with 300+ multivendor integrations that help solve any security use
case?

  • A. Cortex XSOAR
  • B. Prisma Cloud
  • C. AutoFocus
  • D. Cortex XDR
Answer:

A

Discussions

Question 6

Why have software developers widely embraced the use of containers?

  • A. Containers require separate development and production environments to promote authentic code.
  • B. Containers share application dependencies with other containers and with their host computer.
  • C. Containers simplify the building and deploying of cloud native applications.
  • D. Containers are host specific and are not portable across different virtual machine hosts.
Answer:

C

Discussions

Question 7

On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?

  • A. operating system patches
  • B. full-disk encryption
  • C. periodic data backups
  • D. endpoint-based firewall
Answer:

B

Discussions

Question 8

Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are
correctly configured?

  • A. visibility, governance, and compliance
  • B. network protection
  • C. dynamic computing
  • D. compute security
Answer:

A

Discussions

Question 9

Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates
security analysis?

  • A. MineMeld
  • B. AutoFocus
  • C. WildFire
  • D. Cortex XDR
Answer:

D

Discussions

Question 10

Which endpoint tool or agent can enact behavior-based protection?

  • A. AutoFocus
  • B. Cortex XDR
  • C. DNS Security
  • D. MineMeld
Answer:

B

Discussions
To page 2