PCCET SAMPLE QUESTIONS WITH
COMPLETE SOLUTIONS
Which analysis detonates previously unknown submissions in a custom-built, evasion-
resistant virtual environment to determine real-world effects and behavior?
A. Dynamic
B. Pre-exploit protection
C. Bare-metal
D. Static - Correct Answers -A. Dynamic
What is required for a SIEM to operate correctly to ensure a translated flow from the
system of interest to the SIEM data lake?
A. connectors and interfaces
B. infrastructure and containers
C. containers and developers
D. data center and UPS - Correct Answers -A. connectors and interfaces
hich type of Wi-Fi attack depends on the victim initiating the connection?
A. Evil twin
B. Jasager
C. Parager
D. Mirai - Correct Answers -A. Evil twin
Which term describes data packets that move in and out of the virtualized environment
from the host network or a corresponding traditional data center?
A. North-South traffic
B. Intrazone traffic
C. East-West traffic
D. Interzone traffic - Correct Answers -A. North-South traffic
Which organizational function is responsible for security automation and eventual
vetting of the solution to help ensure consistency through machine-driven responses to
security issues?
A. NetOps
B. SecOps
,C. SecDevOps
D. DevOps - Correct Answers -B. SecOps
On an endpoint, which method should you use to secure applications against exploits?
A. endpoint-based firewall
B. strong user passwords
C. full-disk encryption
D. software patches - Correct Answers -D. software patches
Which not-for-profit organization maintains the common vulnerability exposure catalog
that is available through their public website?
A. Department of Homeland Security
B. MITRE
C. Office of Cyber Security and Information Assurance
D. Cybersecurity Vulnerability Research Center - Correct Answers -B. MITRE
Which Palo Alto Networks tools enable a proactive, prevention-based approach to
network automation that accelerates security analysis?
A. MineMeld
B. AutoFocus
C. WildFire
D. Cortex XDR - Correct Answers -D. Cortex XDR
Which endpoint product from Palo Alto Networks can help with SOC visibility?
A. STIX
B. Cortex XDR
C. WildFire
D. AutoFocus - Correct Answers -B. Cortex XDR
Which technique changes protocols at random during a session?
A. use of non-standard ports
B. port hopping
C. hiding within SSL encryption
D. tunneling within commonly used services - Correct Answers -B. port hopping
What is the primary security focus after consolidating data center hypervisor hosts
within trust levels?
A. control and protect inter-host traffic using routers configured to use the Border
Gateway Protocol (BGP) dynamic routing protocol
B. control and protect inter-host traffic by exporting all your traffic logs to a sysvol log
server using the User Datagram Protocol (UDP)
C. control and protect inter-host traffic by using IPv4 addressing
D. control and protect inter-host traffic using physical network security appliances -
Correct Answers -D. control and protect inter-host traffic using physical network security
appliances
, Which product from Palo Alto Networks extends the Security Operating Platform with
the global threat intelligence and attack context needed to accelerate analysis,
forensics, and hunting workflows?
A. Global Protect
B. WildFire
C. AutoFocus
D. STIX - Correct Answers -C. AutoFocus
Which characteristic of serverless computing enables developers to quickly deploy
application code?
A. Uploading cloud service autoscaling services to deploy more virtual machines to run
their application code based on user demand
B. Uploading the application code itself, without having to provision a full container
image or any OS virtual machine components
C. Using cloud service spot pricing to reduce the cost of using virtual machines to run
their application code
D. Using Container as a Service (CaaS) to deploy application containers to run their
code. - Correct Answers -B. Uploading the application code itself, without having to
provision a full container image or any OS virtual machine components
Which key component is used to configure a static route?
A. router ID
B. enable setting
C. routing protocol
D. next hop IP address - Correct Answers -D. next hop IP address
A native hypervisor runs:
A. with extreme demands on network throughput
B. only on certain platforms
C. within an operating system's environment
D. directly on the host computer's hardware - Correct Answers -D. directly on the host
computer's hardware
Which Palo Alto Networks product provides playbooks with 300+ multivendor
integrations that help solve any security use case?
A. Cortex XSOAR
B. Prisma Cloud
C. AutoFocus
D. Cortex XDR - Correct Answers -A. Cortex XSOAR
Which activities do local organization security policies cover for a SaaS application?
A. how the data is backed up in one or more locations
B. how the application can be used
C. how the application processes the data
D. how the application can transit the Internet - Correct Answers -B. how the application
can be used
COMPLETE SOLUTIONS
Which analysis detonates previously unknown submissions in a custom-built, evasion-
resistant virtual environment to determine real-world effects and behavior?
A. Dynamic
B. Pre-exploit protection
C. Bare-metal
D. Static - Correct Answers -A. Dynamic
What is required for a SIEM to operate correctly to ensure a translated flow from the
system of interest to the SIEM data lake?
A. connectors and interfaces
B. infrastructure and containers
C. containers and developers
D. data center and UPS - Correct Answers -A. connectors and interfaces
hich type of Wi-Fi attack depends on the victim initiating the connection?
A. Evil twin
B. Jasager
C. Parager
D. Mirai - Correct Answers -A. Evil twin
Which term describes data packets that move in and out of the virtualized environment
from the host network or a corresponding traditional data center?
A. North-South traffic
B. Intrazone traffic
C. East-West traffic
D. Interzone traffic - Correct Answers -A. North-South traffic
Which organizational function is responsible for security automation and eventual
vetting of the solution to help ensure consistency through machine-driven responses to
security issues?
A. NetOps
B. SecOps
,C. SecDevOps
D. DevOps - Correct Answers -B. SecOps
On an endpoint, which method should you use to secure applications against exploits?
A. endpoint-based firewall
B. strong user passwords
C. full-disk encryption
D. software patches - Correct Answers -D. software patches
Which not-for-profit organization maintains the common vulnerability exposure catalog
that is available through their public website?
A. Department of Homeland Security
B. MITRE
C. Office of Cyber Security and Information Assurance
D. Cybersecurity Vulnerability Research Center - Correct Answers -B. MITRE
Which Palo Alto Networks tools enable a proactive, prevention-based approach to
network automation that accelerates security analysis?
A. MineMeld
B. AutoFocus
C. WildFire
D. Cortex XDR - Correct Answers -D. Cortex XDR
Which endpoint product from Palo Alto Networks can help with SOC visibility?
A. STIX
B. Cortex XDR
C. WildFire
D. AutoFocus - Correct Answers -B. Cortex XDR
Which technique changes protocols at random during a session?
A. use of non-standard ports
B. port hopping
C. hiding within SSL encryption
D. tunneling within commonly used services - Correct Answers -B. port hopping
What is the primary security focus after consolidating data center hypervisor hosts
within trust levels?
A. control and protect inter-host traffic using routers configured to use the Border
Gateway Protocol (BGP) dynamic routing protocol
B. control and protect inter-host traffic by exporting all your traffic logs to a sysvol log
server using the User Datagram Protocol (UDP)
C. control and protect inter-host traffic by using IPv4 addressing
D. control and protect inter-host traffic using physical network security appliances -
Correct Answers -D. control and protect inter-host traffic using physical network security
appliances
, Which product from Palo Alto Networks extends the Security Operating Platform with
the global threat intelligence and attack context needed to accelerate analysis,
forensics, and hunting workflows?
A. Global Protect
B. WildFire
C. AutoFocus
D. STIX - Correct Answers -C. AutoFocus
Which characteristic of serverless computing enables developers to quickly deploy
application code?
A. Uploading cloud service autoscaling services to deploy more virtual machines to run
their application code based on user demand
B. Uploading the application code itself, without having to provision a full container
image or any OS virtual machine components
C. Using cloud service spot pricing to reduce the cost of using virtual machines to run
their application code
D. Using Container as a Service (CaaS) to deploy application containers to run their
code. - Correct Answers -B. Uploading the application code itself, without having to
provision a full container image or any OS virtual machine components
Which key component is used to configure a static route?
A. router ID
B. enable setting
C. routing protocol
D. next hop IP address - Correct Answers -D. next hop IP address
A native hypervisor runs:
A. with extreme demands on network throughput
B. only on certain platforms
C. within an operating system's environment
D. directly on the host computer's hardware - Correct Answers -D. directly on the host
computer's hardware
Which Palo Alto Networks product provides playbooks with 300+ multivendor
integrations that help solve any security use case?
A. Cortex XSOAR
B. Prisma Cloud
C. AutoFocus
D. Cortex XDR - Correct Answers -A. Cortex XSOAR
Which activities do local organization security policies cover for a SaaS application?
A. how the data is backed up in one or more locations
B. how the application can be used
C. how the application processes the data
D. how the application can transit the Internet - Correct Answers -B. how the application
can be used