PANW PCCET EXAM QUESTIONS AND
ANSWERS latest 2024
When is it impossible to secure SaaS data? - ANSWER>>when
a user uses an unmanaged device to access an unsanctioned
SaaS instance
Which option is an example of a static routing protocol? -
ANSWER>>Border Gateway Protocol (BGP)
Which two malware types are self-replicating? (Choose two) -
ANSWER>>Virus, worm
Which types of attack includes an email advertisement for a
dry cleaning service? - ANSWER>>Spamming
Who is the most likely target of social engineering? -
ANSWER>>Junior people, because they are easier to stress
and probably not as well trained
Which two attacks typically use a botnet? - ANSWER>>DDoS,
sending spam to a lengthy mailing list
,An analysis tool raised an alert, but the security analyst who
researched it discovered it wasn't a problem. Which type of
finding is this? - ANSWER>>False positive
Which PANW product suite is used to manage alerts, obtain
additional information and orchestrate responses? -
ANSWER>>Cortex
Which stage of the cyber attack lifecycle makes it important to
provide ongoing education to users on spear phishing links,
unknown emails, and risky websites? - ANSWER>>Delivery
Which DNS record type do you use to find the IPv4 address of
a host? - ANSWER>>A
Which device is M2M (machine to machine)? -
ANSWER>>Temperature sensor connected to a fire
suppression system
How many bytes are in an IPv6 address? - ANSWER>>16
Which three security functions are integrated with a UTM
device? - ANSWER>>Firewall, Intrusion Detection System
(IDS), anti-spam
, Which type of malware protection requires in-depth
knowledge of applications and how they communicate? -
ANSWER>>container-based
Which item accurately describes a security weakness that is
caused by implementing a "ports-first" data security solution
in a traditional data center? - ANSWER>>You may have to
open up multiple ports and these ports could also be used to
gain unauthorised entry to your datacenter.
Which feature of the NGFW can distinguish between reading
Facebook and commenting? - ANSWER>>App-ID
What is the collective term for software versions, OS settings,
and configuration file settings? - ANSWER>>Configuration
items
A provider's applications run on a cloud infrastructure. The
consumer does not manage or control the underlying
infrastructure, Which cloud computing service model is this? -
ANSWER>>Platform as a service (PaaS)
Which NIST cloud deployment model would you recommend
for a startup that does not have much money to pay for
ANSWERS latest 2024
When is it impossible to secure SaaS data? - ANSWER>>when
a user uses an unmanaged device to access an unsanctioned
SaaS instance
Which option is an example of a static routing protocol? -
ANSWER>>Border Gateway Protocol (BGP)
Which two malware types are self-replicating? (Choose two) -
ANSWER>>Virus, worm
Which types of attack includes an email advertisement for a
dry cleaning service? - ANSWER>>Spamming
Who is the most likely target of social engineering? -
ANSWER>>Junior people, because they are easier to stress
and probably not as well trained
Which two attacks typically use a botnet? - ANSWER>>DDoS,
sending spam to a lengthy mailing list
,An analysis tool raised an alert, but the security analyst who
researched it discovered it wasn't a problem. Which type of
finding is this? - ANSWER>>False positive
Which PANW product suite is used to manage alerts, obtain
additional information and orchestrate responses? -
ANSWER>>Cortex
Which stage of the cyber attack lifecycle makes it important to
provide ongoing education to users on spear phishing links,
unknown emails, and risky websites? - ANSWER>>Delivery
Which DNS record type do you use to find the IPv4 address of
a host? - ANSWER>>A
Which device is M2M (machine to machine)? -
ANSWER>>Temperature sensor connected to a fire
suppression system
How many bytes are in an IPv6 address? - ANSWER>>16
Which three security functions are integrated with a UTM
device? - ANSWER>>Firewall, Intrusion Detection System
(IDS), anti-spam
, Which type of malware protection requires in-depth
knowledge of applications and how they communicate? -
ANSWER>>container-based
Which item accurately describes a security weakness that is
caused by implementing a "ports-first" data security solution
in a traditional data center? - ANSWER>>You may have to
open up multiple ports and these ports could also be used to
gain unauthorised entry to your datacenter.
Which feature of the NGFW can distinguish between reading
Facebook and commenting? - ANSWER>>App-ID
What is the collective term for software versions, OS settings,
and configuration file settings? - ANSWER>>Configuration
items
A provider's applications run on a cloud infrastructure. The
consumer does not manage or control the underlying
infrastructure, Which cloud computing service model is this? -
ANSWER>>Platform as a service (PaaS)
Which NIST cloud deployment model would you recommend
for a startup that does not have much money to pay for