New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

Paloalto Networks PCCSA Palo Alto Networks Certified Cybersecurity Associate Exam Practice Test

Demo: 11 questions
Total 79 questions

Palo Alto Networks Certified Cybersecurity Associate Questions and Answers

Question 1

Assume that it is your responsibility to secure the software functioning at top five layers in the exhibit.

Which cloud service model type is represented?

Options:

A.

software as a service

B.

platform as a service

C.

infrastructure as a service

D.

on-premises

Question 2

Which option describes a characteristic of a distributed denial-of-service attack?

Options:

A.

uses multiple types of malware to corrupt system services

B.

uses a single remote host to delete data from multiple target servers

C.

uses a single remote host to flood a target network with traffic

D.

uses a botnet to flood traffic to a target network

Question 3

Which network method securely connects two sites across a public network?

Options:

A.

VPN

B.

VLAN

C.

switch

D.

router

Question 4

During which step of the cyber-attack lifecycle is a user’s web browser redirected to a webpage that automatically downloads malware to the endpoint?

Options:

A.

delivery

B.

weaponization

C.

reconnaissance

D.

command-and-control

Question 5

Which Palo Alto Networks product or feature includes machine learning to enhance security?

Options:

A.

Panorama

B.

MineMeld

C.

Magnifier

D.

User-ID

Question 6

Which security component should be used to prevent a malware attack delivered by USB drive?

Options:

A.

endpoint security

B.

password security

C.

physical security

D.

firewall security

Question 7

When accessing an intranet website, a certificate error is received. What can be done to move past the certificate error and ensure that the error is not received the next time the website is accessed?

Options:

A.

install the website certificate into the web browser

B.

request trusted access from the web developer

C.

enable TLS 2.0 in the advanced options of the web browser

D.

trust the web developer for the application

Question 8

On an endpoint, which method should you use to secure applications against exploits?

Options:

A.

full-disk encryption

B.

strong user passwords

C.

software patches

D.

endpoint-based firewall

Question 9

Review the exhibit and identify the type of vulnerability or attack.

Options:

A.

botnet

B.

man-in-the-middle

C.

spear phishing

D.

buffer overflow

Question 10

When a company chooses to deploy a branch location with antivirus software, which risk model are they using to manage risk?

Options:

A.

limiting

B.

assuming

C.

transferring

D.

avoiding

Question 11

What are two methods to securely transmit personally identifiable information? (Choose two.)

Options:

A.

data checksumming

B.

data fragmentation

C.

data encryption

D.

encrypted tunnels

Demo: 11 questions
Total 79 questions