Palo Alto Networks Certified Cybersecurity Entry-level Technician v1.0 (PCCET)

Page:    1 / 14   
Total 200 questions

In SecOps, what are two of the components included in the identify stage? (Choose two.)

  • A. Initial Research
  • B. Change Control
  • C. Content Engineering
  • D. Breach Response


Answer : AC

Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?

  • A. Network
  • B. Management
  • C. Cloud
  • D. Security


Answer : D

In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)

  • A. SaaS
  • B. PaaS
  • C. On-premises
  • D. IaaS


Answer : AB

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)

  • A. People
  • B. Accessibility
  • C. Processes
  • D. Understanding
  • E. Business


Answer : ACE

Which IoT connectivity technology is provided by satellites?

  • A. 4G/LTE
  • B. VLF
  • C. L-band
  • D. 2G/2.5G


Answer : C

What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?

  • A. run a static analysis
  • B. check its execution policy
  • C. send the executable to WildFire
  • D. run a dynamic analysis


Answer : B

What is the key to `taking down` a botnet?

  • A. prevent bots from communicating with the C2
  • B. install openvas software on endpoints
  • C. use LDAP as a directory service
  • D. block Docker engine software on endpoints


Answer : A

How does Prisma SaaS provide protection for Sanctioned SaaS applications?

  • A. Prisma SaaS connects to an organizations internal print and file sharing services to provide protection and sharing visibility
  • B. Prisma SaaS does not provide protection for Sanctioned SaaS applications because they are secure
  • C. Prisma access uses Uniform Resource Locator (URL) Web categorization to provide protection and sharing visibility
  • D. Prisma SaaS connects directly to sanctioned external service providers SaaS application service to provide protection and sharing visibility


Answer : D

Which type of Software as a Service (SaaS) application provides business benefits, is fast to deploy, requires minimal cost and is infinitely scalable?

  • A. Benign
  • B. Tolerated
  • C. Sanctioned
  • D. Secure


Answer : C

How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?

  • A. DevSecOps improves pipeline security by assigning the security team as the lead team for continuous deployment
  • B. DevSecOps ensures the pipeline has horizontal intersections for application code deployment
  • C. DevSecOps unites the Security team with the Development and Operations teams to integrate security into the CI/CD pipeline
  • D. DevSecOps does security checking after the application code has been processed through the CI/CD pipeline


Answer : C

Which type of LAN technology is being displayed in the diagram?

  • A. Star Topology
  • B. Spine Leaf Topology
  • C. Mesh Topology
  • D. Bus Topology


Answer : C

An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
Requirements for the three subnets:

Subnet 1: 3 host addresses -

Subnet 2: 25 host addresses -

Subnet 3: 120 host addresses -

  • A. 192.168.6.168/30
  • B. 192.168.6.0/25
  • C. 192.168.6.160/29
  • D. 192.168.6.128/27


Answer : B

Which two network resources does a directory service database contain? (Choose two.)

  • A. Services
  • B. /etc/shadow files
  • C. Users
  • D. Terminal shell types on endpoints


Answer : AC

Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?

  • A. SaaS
  • B. DaaS
  • C. PaaS
  • D. IaaS


Answer : D

What is a key advantage and key risk in using a public cloud environment?

  • A. Multi-tenancy
  • B. Dedicated Networks
  • C. Dedicated Hosts
  • D. Multiplexing


Answer : A

Page:    1 / 14   
Total 200 questions