PA PCCET STUDY GUIDE WITH
COMPLETE SOLUTIONS
True or False: Business intelligence (BI) software consists of tools and techniques used
to surface large amounts of raw unstructured data to perform a variety of tasks,
including data mining, event processing, and predictive analytics. - Correct Answers -
True
True or False: The process in which end users find personal technology and apps that
are more powerful or capable, more convenient, less expensive, quicker to install, and
easier to use than enterprise IT solutions is known as consumerization. - Correct
Answers -True
Which action is associated with Web 1.0? - Correct Answers -checking CNN's website
for news
Which action is associated with Web 3.0? - Correct Answers -asking Apple's Siri a
question
Gmail is associated with which cloud computing model? - Correct Answers -SaaS
Which two port numbers are associated with HTTP? (Choose two.) - Correct Answers -
80, 8080
Which port number is associated with HTTPS? - Correct Answers -443
Which port is used for encrypted communication? - Correct Answers -22
Which protocol distinguishes between applications using port numbers? - Correct
Answers -TCP
How do attackers prevent port scans from being noticed by monitoring software? -
Correct Answers -Scan ports so quickly it is finished before it can be detected and
stopped
Which potentially risky attribute is the most serious? - Correct Answers -Malware
, Which one of these applications can be used as a tunnel for other applications? -
Correct Answers -SSH
Which two devices or systems require the configuration of non-standard ports to be able
to use an application on a non-standard port? (Choose two.) - Correct Answers -Client,
Server
If you are responsible for the application's security, but not the operating system's
security, which cloud computing service model are you using? - Correct Answers -PaaS
Which kind of security always is the responsibility of the cloud customer? - Correct
Answers -Data Security
Where is your data typically stored in a SaaS application? - Correct Answers -in the
cloud, in a database controlled by the SaaS provider
Who is responsible for the security settings in an enterprise SaaS application? (choose
the best answer) - Correct Answers -Both IT administrators and users
When is it impossible to secure SaaS data? - Correct Answers -when a user uses an
unmanaged device to access an unsanctioned SaaS
True or False. An organization can be compliant with all applicable security and privacy
regulations for its industry yet still not be secure. - Correct Answers -True
Which three data fields are considered personally identifiable information (PII)? (select
three) - Correct Answers -unique identification number (such as driver's license
number), phone number, fingerprints
Which risk is eliminated in an organization that is 100% compliant? - Correct Answers -
having the regulator punish you for being non-compliant
What does CVE mean? - Correct Answers -Common Vulnerabilities and Exposures
What is the difference between CVE and CVSS? - Correct Answers -CVE tells you what
the vulnerabilities are. CVSS gives vulnerabilities a score (0- 10) to evaluate how
serious they are.
True or False. External threat actors have accounted for the majority of data breaches
over the past five years. - Correct Answers -True
Which group is likely to attack indiscriminately, whether you are a valuable target or
not? - Correct Answers -Cyberterrorists
Which group is primarily motivated by money? - Correct Answers -Cybercriminals
COMPLETE SOLUTIONS
True or False: Business intelligence (BI) software consists of tools and techniques used
to surface large amounts of raw unstructured data to perform a variety of tasks,
including data mining, event processing, and predictive analytics. - Correct Answers -
True
True or False: The process in which end users find personal technology and apps that
are more powerful or capable, more convenient, less expensive, quicker to install, and
easier to use than enterprise IT solutions is known as consumerization. - Correct
Answers -True
Which action is associated with Web 1.0? - Correct Answers -checking CNN's website
for news
Which action is associated with Web 3.0? - Correct Answers -asking Apple's Siri a
question
Gmail is associated with which cloud computing model? - Correct Answers -SaaS
Which two port numbers are associated with HTTP? (Choose two.) - Correct Answers -
80, 8080
Which port number is associated with HTTPS? - Correct Answers -443
Which port is used for encrypted communication? - Correct Answers -22
Which protocol distinguishes between applications using port numbers? - Correct
Answers -TCP
How do attackers prevent port scans from being noticed by monitoring software? -
Correct Answers -Scan ports so quickly it is finished before it can be detected and
stopped
Which potentially risky attribute is the most serious? - Correct Answers -Malware
, Which one of these applications can be used as a tunnel for other applications? -
Correct Answers -SSH
Which two devices or systems require the configuration of non-standard ports to be able
to use an application on a non-standard port? (Choose two.) - Correct Answers -Client,
Server
If you are responsible for the application's security, but not the operating system's
security, which cloud computing service model are you using? - Correct Answers -PaaS
Which kind of security always is the responsibility of the cloud customer? - Correct
Answers -Data Security
Where is your data typically stored in a SaaS application? - Correct Answers -in the
cloud, in a database controlled by the SaaS provider
Who is responsible for the security settings in an enterprise SaaS application? (choose
the best answer) - Correct Answers -Both IT administrators and users
When is it impossible to secure SaaS data? - Correct Answers -when a user uses an
unmanaged device to access an unsanctioned SaaS
True or False. An organization can be compliant with all applicable security and privacy
regulations for its industry yet still not be secure. - Correct Answers -True
Which three data fields are considered personally identifiable information (PII)? (select
three) - Correct Answers -unique identification number (such as driver's license
number), phone number, fingerprints
Which risk is eliminated in an organization that is 100% compliant? - Correct Answers -
having the regulator punish you for being non-compliant
What does CVE mean? - Correct Answers -Common Vulnerabilities and Exposures
What is the difference between CVE and CVSS? - Correct Answers -CVE tells you what
the vulnerabilities are. CVSS gives vulnerabilities a score (0- 10) to evaluate how
serious they are.
True or False. External threat actors have accounted for the majority of data breaches
over the past five years. - Correct Answers -True
Which group is likely to attack indiscriminately, whether you are a valuable target or
not? - Correct Answers -Cyberterrorists
Which group is primarily motivated by money? - Correct Answers -Cybercriminals