New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 2

Questions 11

Which action must Secunty Operations take when dealing with a known attack?

Options:
A.

Document, monitor, and track the incident.

B.

Limit the scope of who knows about the incident.

C.

Increase the granularity of the application firewall.

D.

Disclose details of lhe attack in accordance with regulatory standards.

Paloalto Networks Practitioner Premium Access
Questions 12

Match the IoT connectivity description with the technology.

Practitioner Question 12

Options:
Questions 13

Match the Palo Alto Networks WildFire analysis verdict with its definition.

Practitioner Question 13

Options:
Questions 14

Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?

Options:
A.

during the selective network security virtualization phase, all intra-host communication paths are strictly controlled

B.

during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy server

C.

during the selective network security virtualization phase, all intra-host traffic is encapsulated and encrypted using the IPSEC protocol

D.

during the selective network security virtualization phase, all intra-host traffic is load balanced

Questions 15

Which two statements apply to the SSL/TLS protocol? (Choose two.)

Options:
A.

It contains password characters that users enter to access encrypted data.

B.

It is a method used to encrypt data and authenticate web-based communication.

C.

It ensures the data that is transferred between a client and a server remains private.

D.

It provides administrator privileges to manage and control the access of network resources.

Questions 16

Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?

Options:
A.

Virtual

B.

Container

C.

Physical

D.

SASE

Questions 17

Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?

Options:
A.

API

B.

Code security

C.

Virtualization

D.

IRP

Questions 18

Which of these ports is normally associated with HTTPS?

Options:
A.

443

B.

5050

C.

25

D.

80

Questions 19

What role do containers play in cloud migration and application management strategies?

Options:
A.

They enable companies to use cloud-native tools and methodologies.

B.

They are used for data storage in cloud environments.

C.

They serve as a template manager for software applications and services.

D.

They are used to orchestrate virtual machines (VMs) in cloud environments.

Questions 20

When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)

Options:
A.

decrypt the infected file using base64

B.

alert system administrators

C.

quarantine the infected file

D.

delete the infected file

E.

remove the infected file’s extension