Palo Alto Networks PCCP - Palo Alto Networks Cybersecurity Practitioner Exam
Page: 1 / 14
Total 70 questions
Question #1 (Topic: Exam A)
Which methodology does Identity Threat Detection and Response (ITDR) use?
A. Behavior analysis
B. Comparison of alerts to signatures
C. Manual inspection of user activities
D. Rule-based activity prioritization
Answer: A
Question #2 (Topic: Exam A)
Which technology grants enhanced visibility and threat prevention locally on a device?
A. EDR
B. IDS
C. SIEM
D. DLP
Answer: A
Question #3 (Topic: Exam A)
What are two examples of an attacker using social engineering? (Choose two.)
A. Convincing an employee that they are also an employee
B. Leveraging open-source intelligence to gather information about a high-level executive
C. Acting as a company representative and asking for personal information not relevant to the reason for their call
D. Compromising a website and configuring it to automatically install malicious files onto systems that visit the page
Answer: AC
Question #4 (Topic: Exam A)
Which two services does a managed detection and response (MDR) solution provide? (Choose two.)
A. Improved application development
B. Incident impact analysis
C. Periodic firewall updates
D. Proactive threat hunting
Answer: BD
Question #5 (Topic: Exam A)
What role do containers play in cloud migration and application management strategies?
A. They enable companies to use cloud-native tools and methodologies.
B. They are used for data storage in cloud environments.
C. They serve as a template manager for software applications and services.
D. They are used to orchestrate virtual machines (VMs) in cloud environments.
Answer: A