Paloalto Networks PCCET Palo Alto Networks Certified Cybersecurity Entry-level Technician Online Training
Paloalto Networks PCCET Online Training
The questions for PCCET were last updated at May 29,2024.
- Exam Code: PCCET
- Exam Name: Palo Alto Networks Certified Cybersecurity Entry-level Technician
- Certification Provider: Paloalto Networks
- Latest update: May 29,2024
Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?
- A . User-ID
- B . Device-ID
- C . App-ID
- D . Content-ID
C
Explanation:
App-ID™ technology leverages the power of the broad global community to provide continuous identification, categorization, and granular risk-based control of known and previously unknown SaaS applications, ensuring new applications are discovered automatically as they become popular.
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
- A . Knowledge-based
- B . Signature-based
- C . Behavior-based
- D . Database-based
C
Explanation:
IDSs and IPSs also can be classified as knowledge-based (or signature-based) or behavior-based (or statistical anomaly-based) systems:
A knowledge-based system uses a database of known vulnerabilities and attack profiles to identify intrusion attempts. These types of systems have lower false-alarm rates than behavior-based systems but must be continually updated with new attack signatures to be effective.
A behavior-based system uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt. These types of systems are more adaptive than knowledge-based systems and therefore may be more effective in detecting previously unknown vulnerabilities and attacks, but they have a much higher false-positive rate than knowledge-based systems
Which of the following is an AWS serverless service?
- A . Beta
- B . Kappa
- C . Delta
- D . Lambda
D
Explanation:
Examples of serverless environments include Amazon Lambda and Azure Functions. Many PaaS offerings, such as Pivotal Cloud Foundry, also are effectively serverless even if they have not historically been marketed as such. Although serverless may appear to lack the container-specific, cloud native attribute, containers are extensively used in the underlying implementations, even if those implementations are not exposed to end users directly.
Which native Windows application can be used to inspect actions taken at a specific time?
- A . Event Viewer
- B . Timeline inspector
- C . Task Manager
- D . Task Scheduler
Which type of LAN technology is being displayed in the diagram?
- A . Star Topology
- B . Spine Leaf Topology
- C . Mesh Topology
- D . Bus Topology
Which activities do local organization security policies cover for a SaaS application?
- A . how the data is backed up in one or more locations
- B . how the application can be used
- C . how the application processes the data
- D . how the application can transit the Internet
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
- A . Birthplace
- B . Login 10
- C . Profession
- D . Name
Which product from Palo Alto Networks extends the Security Operating Platform with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows?
- A . Global Protect
- B . WildFire
- C . AutoFocus
- D . STIX
C
Explanation:
page 173 "AutoFocus makes over a billion samples and sessions, including billions of artifacts, immediately actionable for security analysis and response efforts. AutoFocus extends the product portfolio with the global threat intelligence and attack context needed to accelerate analysis, forensics, and hunting workflows. Together, the platform and AutoFocus move security teams away from legacy manual approaches that rely on aggregating a growing number of detectionbased alerts and post-event mitigation, to preventing sophisticated attacks and enabling proactive hunting activities."
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
- A . DevSecOps improves pipeline security by assigning the security team as the lead team for continuous deployment
- B . DevSecOps ensures the pipeline has horizontal intersections for application code deployment
- C . DevSecOps unites the Security team with the Development and Operations teams to integrate security into the CI/CD pipeline
- D . DevSecOps does security checking after the application code has been processed through the CI/CD pipeline
C
Explanation:
DevSecOps takes the concept behind DevOps that developers and IT teams should work together closely, instead of separately, throughout software delivery and extends it to include security and integrate automated checks into the full CI/CD pipeline. The integration of the CI/CD pipeline takes care of the problem of security seeming like an outside force and instead allows developers to maintain their usual speed without compromising data security
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?
- A . the network is large
- B . the network is small
- C . the network has low bandwidth requirements
- D . the network needs backup routes
A
Explanation:
A static routing protocol requires that routes be created and updated manually on a router or other network device. If a static route is down, traffic can’t be automatically rerouted unless an alternate route has been configured. Also, if the route is congested, traffic can’t be automatically rerouted over the less congested alternate route. Static routing is practical only in very small networks or for very limited, special-case routing scenarios (for example, a destination that’s used as a backup route or is reachable only via a single router). However, static routing has low bandwidth requirements (routing information isn’t broadcast across the network) and some built-in security (users can route only to destinations that are specified in statically defined routes).