PALO ALTO PCCET EXAM
QUESTIONS AND ANSWERS
which malware type is installed in the bios of a machine, which means operating system
level tools cannot detect it? - Correct Answers -root kit
which type of advanced malware has entire sections of code that serve no purpose
other than to change the signature of the malware that's producing an infinite number of
signatures hashes for even the smallest of malware programs? - Correct Answers -a.
obfuscated
b. distributed
c. multi functional
d. polymorphism CORRECT
which type of fishing attack is specifically directed at senior executives or other high
profile targets within an organization? - Correct Answers -a. spear phishing
b. whaling CORRECT
c. water holing
d. pharming
with security consideration is associated with inadvertently missed anti-malware and
security patch updates to virtual machines - Correct Answers -hypervisor vulnerabilities
VM sprawl
dormant VM's CORRECT
intra-VM communication
what's cloud security compliance requirement uses granular policy definitions to govern
access to SAS applications and resources in the public cloud and to apply network
segmentation - Correct Answers -access governance CORRECT
compliance auditing
configuration governance
real-time discovery
QUESTIONS AND ANSWERS
which malware type is installed in the bios of a machine, which means operating system
level tools cannot detect it? - Correct Answers -root kit
which type of advanced malware has entire sections of code that serve no purpose
other than to change the signature of the malware that's producing an infinite number of
signatures hashes for even the smallest of malware programs? - Correct Answers -a.
obfuscated
b. distributed
c. multi functional
d. polymorphism CORRECT
which type of fishing attack is specifically directed at senior executives or other high
profile targets within an organization? - Correct Answers -a. spear phishing
b. whaling CORRECT
c. water holing
d. pharming
with security consideration is associated with inadvertently missed anti-malware and
security patch updates to virtual machines - Correct Answers -hypervisor vulnerabilities
VM sprawl
dormant VM's CORRECT
intra-VM communication
what's cloud security compliance requirement uses granular policy definitions to govern
access to SAS applications and resources in the public cloud and to apply network
segmentation - Correct Answers -access governance CORRECT
compliance auditing
configuration governance
real-time discovery