PALO ALTO PCCET EXAM
QUESTIONS AND ANSWERS
When is it impossible to secure SaaS data?
When a user uses an unmanaged device to access an unsanctioned SaaS instance.
When a user uses a managed device to access an unsanctioned SaaS instance.
When a user uses an unmanaged device to access a sanctioned SaaS instance.
When a user uses a managed device to access a sanctioned SaaS instance. - Correct
Answers -When a user uses an unmanaged device to access an unsanctioned SaaS
instance.
Which group is primarily motivated by money?
hacktivists
cybercriminals
cyberterrorists
state-affiliated groups - Correct Answers -Cybercriminals
Which two malware types are self-replicating? (Choose two.)
logic bomb
back door
virus
trojan horse
worm - Correct Answers -Virus
Worm
Which type of attack includes an email advertisement for a dry cleaning service?
spamming
phishing
spear phishing
whaling - Correct Answers -Spamming
,Who is the most likely target of social engineering?
Executive management, because it has the most permissions.
Senior IT engineers, because the attacker hopes to get them to disable the security
infrastructure.
Junior people, because they are easier to stress and probably not as well trained.
The accounting department, because it can wire money directly to the attacker's
account. - Correct Answers -Junior people, because they are easier to stress and
probably not as well trained.
Which two attacks typically use a botnet? (Choose two.)
Ssocial engineering
DoS
DDoS
Sending spam to a lengthy mailing list
Spear phishing - Correct Answers -DDoS
Sending spam to a lengthy mailing list.
What is the name of the attack in which the attacker gets the victim to connect to an
access point the attack controls?
Person in the middle
Man in the middle
Access point in the middle
Access point masquerading - Correct Answers -Man in the middle
Which Palo Alto Networks product suite is used to manage alerts, obtain additional
information, and orchestrate responses?
Strata
Prisma
Cortex
WildFire - Correct Answers -Cortex
On which device do you configure VLANs?
wireless repeater
hub
switch
router - Correct Answers -Switch
Which DNS record type do you use to find the IPv4 address of a host?
, A
AAAA
PTR
MX - Correct Answers -A
Which device is M2M (machine to machine)?
Internet-connected TV
home alarm that dials the police for response
car GPS
temperature sensor connected to a fire suppression system - Correct Answers -
Temperature sensor connected to a fire suppression system.
How many bytes are in an IPv6 address?
4
8
16
32 - Correct Answers -16
Which three security functions are integrated with a UTM device? (Choose three.)
cloud access security broker (CASB)
firewall
Remote Browser Isolation (RBI)
Intrusion Detection System (IDS)
anti-spam
DevOps automation - Correct Answers -firewall
Intrusion Detection System (IDS)
anti-spam
Which type of malware protection requires in-depth knowledge of applications and how
they communicate?
signature-based
container-based
application allow lists
anomaly detection - Correct Answers -Container-based
Which Panorama object is used to manage the security policy?
template
device group
virtual system
Decryption Profile - Correct Answers -Device group
QUESTIONS AND ANSWERS
When is it impossible to secure SaaS data?
When a user uses an unmanaged device to access an unsanctioned SaaS instance.
When a user uses a managed device to access an unsanctioned SaaS instance.
When a user uses an unmanaged device to access a sanctioned SaaS instance.
When a user uses a managed device to access a sanctioned SaaS instance. - Correct
Answers -When a user uses an unmanaged device to access an unsanctioned SaaS
instance.
Which group is primarily motivated by money?
hacktivists
cybercriminals
cyberterrorists
state-affiliated groups - Correct Answers -Cybercriminals
Which two malware types are self-replicating? (Choose two.)
logic bomb
back door
virus
trojan horse
worm - Correct Answers -Virus
Worm
Which type of attack includes an email advertisement for a dry cleaning service?
spamming
phishing
spear phishing
whaling - Correct Answers -Spamming
,Who is the most likely target of social engineering?
Executive management, because it has the most permissions.
Senior IT engineers, because the attacker hopes to get them to disable the security
infrastructure.
Junior people, because they are easier to stress and probably not as well trained.
The accounting department, because it can wire money directly to the attacker's
account. - Correct Answers -Junior people, because they are easier to stress and
probably not as well trained.
Which two attacks typically use a botnet? (Choose two.)
Ssocial engineering
DoS
DDoS
Sending spam to a lengthy mailing list
Spear phishing - Correct Answers -DDoS
Sending spam to a lengthy mailing list.
What is the name of the attack in which the attacker gets the victim to connect to an
access point the attack controls?
Person in the middle
Man in the middle
Access point in the middle
Access point masquerading - Correct Answers -Man in the middle
Which Palo Alto Networks product suite is used to manage alerts, obtain additional
information, and orchestrate responses?
Strata
Prisma
Cortex
WildFire - Correct Answers -Cortex
On which device do you configure VLANs?
wireless repeater
hub
switch
router - Correct Answers -Switch
Which DNS record type do you use to find the IPv4 address of a host?
, A
AAAA
PTR
MX - Correct Answers -A
Which device is M2M (machine to machine)?
Internet-connected TV
home alarm that dials the police for response
car GPS
temperature sensor connected to a fire suppression system - Correct Answers -
Temperature sensor connected to a fire suppression system.
How many bytes are in an IPv6 address?
4
8
16
32 - Correct Answers -16
Which three security functions are integrated with a UTM device? (Choose three.)
cloud access security broker (CASB)
firewall
Remote Browser Isolation (RBI)
Intrusion Detection System (IDS)
anti-spam
DevOps automation - Correct Answers -firewall
Intrusion Detection System (IDS)
anti-spam
Which type of malware protection requires in-depth knowledge of applications and how
they communicate?
signature-based
container-based
application allow lists
anomaly detection - Correct Answers -Container-based
Which Panorama object is used to manage the security policy?
template
device group
virtual system
Decryption Profile - Correct Answers -Device group