PCCET Study Guide Questions With Correct
Answers
Palo Alto Networks firewalls are built on which type of architecture? - answer✔✔single pass
Bytes in an IPv4 address - answer✔✔32 bits
Bytes in an IPv6 address - answer✔✔128 bits
malware type can change code and signature patterns with each iteration -
answer✔✔metamorphic virus
3 deployment mode options for Panorama - answer✔✔Panorama mode, Management only
mode, Log collected mode
Mobile device management (MDM) - answer✔✔software provides endpoint security for mobile
devices such as smartphones and tablets
security method requires passcodes, enables encryption, lock down security settings, & prevents
jailbreaking and rooting - answer✔✔Policy enforcement
OSI layer that defines routing protocols & specifies how routers communicate with each other on
a network - answer✔✔Network layer3
OSI LAYER 7 - answer✔✔Application- identifies availability of communication partners,
resource availability, synchronizes communication. FTP,
HTTP,IMAP,POP3,SMTP,SNMP,Telnet
OSI LAYER 6 - answer✔✔Presentation- provides coding & conversion functions to ensure data
sent from application layer of system is compatible with the application layer of the receiving
system. ASCII,EBCDIC,GIF,JPEG,MPEG
OSI LAYER 5 - answer✔✔Session- communication sessions between networked systems
including connection, data transfer, and connection release. NFS,RPC,SSH,SIP
, BRIGHTSTARS EXAM STUDY SOLUTIONS 8/15/2024 2:05 PM
OSI LAYER 4 - answer✔✔Transport- transparent, reliable data transports & end-to-end
transmission control. Flow control,Multiplexing, Virtual circuit management, error
checking/recovery, TCP,UDP,SCTP
OSI LAYER 3 - answer✔✔Network- routing protocols are defined here. uses IP routing. allows
data to be transported b/w systems on the same network or interconnected networks
OSI LAYER 2 - answer✔✔Data link- ensures that messages are delivered to the proper device
across a physical network link. Switches typically operate here. LLC, MAC
OSI LAYER 1 - answer✔✔Physical- send and receives bits across network medium from 1
device to another. species electrical, mechanical and functional requirements of network.
System does not perform any preventive action to stop an attack - answer✔✔Intrusion Detection
CIDR - answer✔✔Classless inter-domain routing
a network device that connects to a router or wired network and transmits a Wi-Fi signal so that
wireless devices can connect to a wireless (or Wi-Fi) network - answer✔✔AP- access point
physical or virtual devices that send data packets to destination networks along a network path
using logical addresses - answer✔✔routers
a network device that connects multiple devices such as desktop computers, laptop docking
stations, and printers on a LAN. Network traffic is broadcasted out of all ports , which can create
network congestion and introduces potential security risks - answer✔✔hub
Essentially an intelligent hub that uses physical addresses to forward data packets to devices on a
network. Unlike a hub, this is designed to forward data packets only to the port that corresponds
to the destination device. - answer✔✔switch
Also, a switch can be used to implement virtual LANs (VLANs), which logically segregate
what? - answer✔✔logically segregate a network and limit broadcast domains and collision
domains.
T/F - a robust data loss prevention (DLP) solution can detect data patterns even if the data is
encrypted - answer✔✔True
DS/IPS system uses a database of known vulnerabilities and attack profiles to identify intrusion
attempts - answer✔✔knowledge-based
next-generation product replaces UTM appliances to reduce traffic inspection latency -
answer✔✔
PAN-OS Next-Generation Firewall configuration templates are based on security best practice
recommendations instead of extensive how-to documentation - answer✔✔Iron-skillet