Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Proofpoint > Threat Protection Analyst > PPAN01

PPAN01 Certified Threat Protection Analyst Exam Question and Answers

Question # 4

What is the primary function of the People Page in the Threat Protection Workbench and TAP Dashboard?

A.

To manage user permissions and access controls.

B.

To configure email filtering rules for specific users.

C.

To track user engagement with phishing simulations.

D.

To help identify and prioritize users affected by threats.

Full Access
Question # 5

For which two reasons should organizations customize their incident response plans based on NIST SP 800-61 or another incident response standard? (Select two.)

A.

To make it more generic so that it can be used to respond to incidents from new attack vectors.

B.

To document the contact information for each of the security analysts at your managed security services provider.

C.

To change the order of operations in the Incident Response Lifecycle processes to match ISO 12035.

D.

To meet unique requirements relating to the organization’s mission, size, structure, and functions.

E.

To improve incident response effectiveness and efficiency by creating a repeatable process and documented handoffs.

Full Access
Question # 6

Which two items should be included in an incident report to be discussed during a post-incident debrief? (Select two.)

A.

Software inventory

B.

Speculation about adversary attribution

C.

Product manuals

D.

Incident timeline

E.

Devices and systems involved

Full Access
Question # 7

Exhibit:

What can be determined by the threat information shown in the exhibit?

A.

Five messages containing this threat were pulled from mailboxes after delivery.

B.

The URLs related to the threat were rewritten after the threat was discovered.

C.

More than 150 messages containing this threat were unclicked or were deleted.

D.

The VIP user clicked on the non-rewritten URL in the threat message.

Full Access
Question # 8

Exhibit:

Which column indicates the number of users targeted by a malicious campaign or threat?

A.

Highlighted

B.

Intended

C.

At Risk

D.

Impacted

Full Access
Question # 9

Based on the exhibit,

which user would most benefit from attending security awareness training based on their behavior?

A.

Logan Green

B.

Scarlett Wilson

C.

Emma Taylor

D.

Jacob Lewis

Full Access
Question # 10

An analyst has been tasked with providing a report that can be used to prioritise investigations based on a user's Attack Index score. Which report would be most suitable for this purpose?

A.

VIP Activity

B.

Top 10 Recipients

C.

Very Attacked People

D.

Top 10 Clickers

Full Access
Question # 11

An analyst is reviewing the Threats page in the TAP Dashboard.

Which of the top four threats seen in the exhibit should be prioritised for investigation?

A.

The Malware Delivery threat

B.

The TOAD (Telephone-Oriented Attack Delivery) threat

C.

The Credential Phishing threat

D.

The BEC (Business Email Compromise) threat

Full Access
Question # 12

Exhibit:

What is indicated by the icon shown in the “Highlighted” column?

A.

The threat has been added to a custom blocklist.

B.

The threat has been reported as a false negative.

C.

The threat has been reported as a false positive.

D.

The threat has been cleared and considered safe.

Full Access
Question # 13

Which two tasks are considered frequent and high-priority when actively reviewing the threat landscape? (Select two.)

A.

Updating user training materials for quarterly phishing simulations.

B.

Scheduling annual penetration tests for system validation.

C.

Monitoring current threats and vulnerabilities affecting systems.

D.

Archiving historical incident reports for long-term compliance.

E.

Reviewing monitoring data to inform risk-based decisions.

Full Access
Question # 14

What is the purpose of Smart Search?

A.

Trace and analyze information about files downloaded from a user's computer.

B.

Trace and analyze information about messages processed by the Proofpoint Protection Server.

C.

Trace and analyze information about user clicks on external websites.

D.

Trace and analyze information about firewall breaches.

Full Access
Question # 15

What type of threat does the Cloud Security Report help identify in connected environments?

A.

Ransomware

B.

Account Takeover

C.

Malicious Insider

D.

Business Email Compromise

Full Access