Palo Alto Networks Cybersecurity Practitioner (PCCP) Questions and Answers
An administrator finds multiple gambling websites in the network traffic log.
What can be created to dynamically block these websites?
Which two statements apply to the SSL/TLS protocol? (Choose two.)
Which tool supercharges security operations center (SOC) efficiency with the world’s most comprehensive operating platform for enterprise security?
What are three benefits of the cloud native security platform? (Choose three.)
What are two characteristics of an advanced persistent threat (APT)? (Choose two.)
What is the recommended method for collecting security logs from multiple endpoints?
Which technology grants enhanced visibility and threat prevention locally on a device?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
What are two key characteristics of a Type 1 hypervisor? (Choose two.)
Why have software developers widely embraced the use of containers?
How does Prisma SaaS provide protection for Sanctioned SaaS applications?
Match the Identity and Access Management (IAM) security control with the appropriate definition.
What is a purpose of workload security on a Cloud Native Security Platform (CNSP)?
What is a reason IoT devices are more susceptible to command-and-control (C2) attacks?
What type of address translation does a NAT perform?
What is a key benefit of Cortex XDR?
Which action is unique to the security orchestration, automation, and response (SOAR) platforms?
How can local systems eliminate vulnerabilities?
Which endpoint product from Palo Alto Networks can help with SOC visibility?
What protocol requires all routers in the same domain to maintain a map of the network?
Which network analysis tool can be used to record packet captures?
Which of these ports is normally associated with HTTPS?
Which technique changes protocols at random during a session?
Which term describes data packets that move in and out of the virtualized environment from the host network or a corresponding traditional data center?
Which of the following is an AWS serverless service?
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?
Which subnet does the host 192.168.19.36/27 belong?
What is a function of SSL/TLS decryption?
Which two statements describe the Jasager attack? (Choose two.)
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?
Which security function enables a firewall to validate the operating system version of a device before granting it network access?
Which type of malware takes advantage of a vulnerability on an endpoint or server?
Which activities do local organization security policies cover for a SaaS application?
Which two network resources does a directory service database contain? (Choose two.)
In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?
Match each description to a Security Operating Platform key capability.
On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?
Which core component is used to implement a Zero Trust architecture?
Which statement describes a host-based intrusion prevention system (HIPS)?
What type of DNS record maps an IPV6 address to a domain or subdomain to another hostname?
Which endpoint protection security option can prevent malware from executing software?
A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.
Which NIST cloud service model is this?
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
A native hypervisor runs:
Which methodology does Identity Threat Detection and Response (ITDR) use?
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
What is an operation of an Attack Surface Management (ASM) platform?
What are two functions of User and Entity Behavior Analytics (UEBA) data in Prisma Cloud CSPM? (Choose two.)
Which of the following is a CI/CD platform?
With regard to cloud-native security in layers, what is the correct order of the four C's from the top (surface) layer to the bottom (base) layer?
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Which option is an example of a North-South traffic flow?
Which native Windows application can be used to inspect actions taken at a specific time?
You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.
Which type of attack is this?
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
What is a characteristic of the National Institute Standards and Technology (NIST) defined cloud computing model?
Which Palo Alto Networks tools enable a proactive, prevention-based approach to network automation that accelerates security analysis?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
What type of attack redirects the traffic of a legitimate website to a fake website?
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?
Which component of the AAA framework regulates user access and permissions to resources?
Which of the following is a Routed Protocol?
Based on how much is managed by the vendor, where can CaaS be situated in the spread of cloud computing services?

