Practitioner Palo Alto Networks Cybersecurity Practitioner (PCCP) Questions and Answers
What type of attack redirects the traffic of a legitimate website to a fake website?
Which characteristic of serverless computing enables developers to quickly deploy application code?
Which term describes establishment of on-premises software on a cloud-based server?
Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?
Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?
Which attacker profile acts independently or as part of an unlawful organization?
When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)
Which type of attack obscures its presence while attempting to spread to multiple hosts in a network?
What are two functions of User and Entity Behavior Analytics (UEBA) data in Prisma Cloud CSPM? (Choose two.)
In a traditional data center what is one result of sequential traffic analysis?
Which aspect of a SaaS application requires compliance with local organizational security policies?
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
An Administrator wants to maximize the use of a network address. The network is 192.168.6.0/24 and there are three subnets that need to be created that can not overlap. Which subnet would you use for the network with 120 hosts?
Requirements for the three subnets: Subnet 1: 3 host addresses
Subnet 2: 25 host addresses
Subnet 3: 120 host addresses
Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Which element of the security operations process is concerned with using external functions to help achieve goals?
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
What type of DNS record maps an IPV6 address to a domain or subdomain to another hostname?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.
Which type of phishing attack does this represent?
Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?
Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.
Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?
Which activities do local organization security policies cover for a SaaS application?
Which security component should you configure to block viruses not seen and blocked by the perimeter firewall?
Which attacker profile uses the internet to recruit members to an ideology, to train them, and to spread fear and include panic?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
What role do containers play in cloud migration and application management strategies?
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
