Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: myex65

Home > Paloalto Networks > Certified Cybersecurity Associate > PCCP

PCCP Palo Alto Certified Cybersecurity Practitioner (PCCP) Question and Answers

Question # 4

An administrator finds multiple gambling websites in the network traffic log.

What can be created to dynamically block these websites?

A.

URL category

B.

Custom signatures

C.

Decryption policy

D.

Application group

Full Access
Question # 5

When does a TLS handshake occur?

A.

Before establishing a TCP connection

B.

Only during DNS over HTTPS queries

C.

After a TCP handshake has been established

D.

Independently of HTTPS communications

Full Access
Question # 6

Which architecture model uses virtual machines (VMs) in a public cloud environment?

A.

Kubernetes

B.

Serverless

C.

Docker

D.

Host-based

Full Access
Question # 7

Which feature is part of an intrusion prevention system (IPS)?

A.

API-based coverage of apps

B.

Automated security actions

C.

Protection of data at rest

D.

Real-time web filtering

Full Access
Question # 8

Which feature of cloud-native security platforms (CNSPs) focuses on protecting virtual machine (VM), container, and serverless deployments against application-level attacks during runtime?

A.

Workload security

B.

Data security

C.

Asset inventory

D.

Configuration assessment

Full Access
Question # 9

What is a dependency for the functionality of signature-based malware detection?

A.

Frequent database updates

B.

Support of a DLP device

C.

API integration with a sandbox

D.

Enabling quality of service

Full Access
Question # 10

Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?

A.

API

B.

Code security

C.

Virtualization

D.

IRP

Full Access
Question # 11

What is the purpose of host-based architectures?

A.

They share the work of both clients and servers.

B.

They allow client computers to perform most of the work.

C.

They divide responsibilities among clients.

D.

They allow a server to perform all of the work virtually.

Full Access
Question # 12

Which type of attack includes exfiltration of data as a primary objective?

A.

Advanced persistent threat

B.

Denial-of-service (DoS)

C.

Watering hole attack

D.

Cross-Site Scripting (XSS)

Full Access
Question # 13

Which component of cloud security is used to identify misconfigurations during the development process?

A.

Container security

B.

SaaS security

C.

Code security

D.

Network security

Full Access
Question # 14

Which two services does a managed detection and response (MDR) solution provide? (Choose two.)

A.

Improved application development

B.

Incident impact analysis

C.

Periodic firewall updates

D.

Proactive threat hunting

Full Access
Question # 15

A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.

Which type of phishing attack does this represent?

A.

Whaling

B.

Vishing

C.

Pharming

D.

Angler phishing

Full Access
Question # 16

What type of attack redirects the traffic of a legitimate website to a fake website?

A.

Watering hole

B.

Pharming

C.

Spear phishing

D.

Whaling

Full Access
Question # 17

Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?

A.

CSPM

B.

ASM

C.

EDR

D.

CVVP

Full Access
Question # 18

Which two descriptions apply to an XDR solution? (Choose two.)

A.

It employs machine learning (ML) to identity threats.

B.

It is designed for reporting on key metrics for cloud environments.

C.

It ingests data from a wide spectrum of sources.

D.

It is focused on single-vector attacks on specific layers of defense.

Full Access
Question # 19

Which activity is a technique in the MITRE ATT&CK framework?

A.

Credential access

B.

Lateral movement

C.

Resource development

D.

Account discovery

Full Access
Question # 20

Which type of system is a user entity behavior analysis (UEBA) tool?

A.

Correlating

B.

Active monitoring

C.

Archiving

D.

sandboxing

Full Access
Question # 21

What are two limitations of signature-based anti-malware software? (Choose two.)

A.

It is unable to detect polymorphic malware.

B.

It requires samples lo be buffered

C.

It uses a static file for comparing potential threats.

D.

It only uses packet header information.

Full Access