Palo Alto Networks Certified Cybersecurity Associate v1.0 (PCCSA)

Page:    1 / 6   
Total 79 questions

Which type of cloud computing service provides access to email and word processing applications running in a cloud infrastructure?

  • A. software as a service
  • B. computing as a service
  • C. platform as a service
  • D. infrastructure as a service


Answer : A

What is the result of deploying virtualization in your data center?

  • A. reduced security threat
  • B. reduced operational costs
  • C. increased hardware capital costs
  • D. increased host provisioning


Answer : B

Which two remote access methods are secure because they encrypt traffic? (Choose two.)

  • A. IPsec-AH
  • B. SSH
  • C. VPN
  • D. Telnet
  • E. rlogin


Answer : BC

Which action must be taken prior to a successful ransomware attack to enable recovery from the attack?

  • A. create a data snapshot on your IDS device
  • B. back up all hosts that contain critical data
  • C. update all firewall malware signatures
  • D. limit external exposure of internal DNS resource records


Answer : B

Which network security architecture feature is designed to purposely expose some of an organization"™s services to untrusted networks?

  • A. network zone
  • B. security zone
  • C. demilitarized zone
  • D. military zone


Answer : C

Which type of cloud computing deployment is available to any person or organization who can pay the usage fees?

  • A. public
  • B. hybrid
  • C. private
  • D. local


Answer : A

DRAG DROP -
Match the attack definition to the type of security method used to protect against the attack.
Select and Place:




Answer :

What is an effective defense against a denial-of-service attack?

  • A. deploy a firewall to reject suspect network packets
  • B. flood the DoS source with ICMP echo requests to reduce attack output
  • C. contact the upstream ISP and disconnect affected network interfaces
  • D. configure additional network interfaces for legitimate network traffic


Answer : C

DRAG DROP -
Match each cryptographic method with its description.
Select and Place:




Answer :

DRAG DROP -
Match the network infrastructure item with its corresponding description.
Select and Place:




Answer :

Which component of a digital certificate provides authentication of the certificate"™s issuer?

  • A. digital signature
  • B. certificate revocation list
  • C. issuer"™s private key
  • D. certificate"™s expiration date


Answer : A

In PKI, which item is issued by a CA?

  • A. digital certificate
  • B. SSH key
  • C. KDC ticket
  • D. shared key


Answer : A

Which type of adversary would execute a website defacement attack to promote a political agenda?

  • A. script kiddie
  • B. hacktivist
  • C. gray hat hacker
  • D. state sponsored hacker


Answer : B

DRAG DROP -
Match each set of terms to their associated security layer.
Select and Place:




Answer :

On an endpoint, which method should you use to secure applications against exploits?

  • A. full-disk encryption
  • B. strong user passwords
  • C. software patches
  • D. endpoint-based firewall


Answer : D

Page:    1 / 6   
Total 79 questions