Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 2

Questions 11

Which technique changes protocols at random during a session?

Options:
A.

use of non-standard ports

B.

port hopping

C.

hiding within SSL encryption

D.

tunneling within commonly used services

Paloalto Networks Practitioner Premium Access
Questions 12

What is used to orchestrate, coordinate, and control clusters of containers?

Options:
A.

Kubernetes

B.

Prisma Saas

C.

Docker

D.

CN-Series

Questions 13

SecOps consists of interfaces, visibility, technology, and which other three elements? (Choose three.)

Options:
A.

People

B.

Accessibility

C.

Processes

D.

Understanding

E.

Business

Questions 14

What is the primary security focus after consolidating data center hypervisor hosts within trust levels?

Options:
A.

control and protect inter-host traffic using routers configured to use the Border Gateway Protocol (BGP) dynamic routing protocol

B.

control and protect inter-host traffic by exporting all your traffic logs to a sysvol log server using the User Datagram Protocol (UDP)

C.

control and protect inter-host traffic by using IPv4 addressing

D.

control and protect inter-host traffic using physical network security appliances

Questions 15

Which component of cloud security uses automated testing with static application security testing (SAST) to identify potential threats?

Options:
A.

API

B.

Code security

C.

Virtualization

D.

IRP

Questions 16

Match the Palo Alto Networks WildFire analysis verdict with its definition.

Practitioner Question 16

Options:
Questions 17

You received an email, allegedly from a bank, that asks you to click a malicious link to take action on your account.

Which type of attack is this?

Options:
A.

Whaling

B.

Spamming

C.

Spear phishing

D.

Phishing

Questions 18

Which network device breaks networks into separate broadcast domains?

Options:
A.

Hub

B.

Layer 2 switch

C.

Router

D.

Wireless access point

Questions 19

Which characteristic of advanced malware makes it difficult to detect?

Options:
A.

Data decompression

B.

Registered certificates

C.

Morphing code

D.

Low traffic volumes

Questions 20

Which internet of things (loT) connectivity technology operates on the 2.4GHz and 5GHz bands, as well as all bands between 1 and 6GHz when they become available for 802.11 use. at ranges up to 11 Gbit/s?

Options:
A.

3G

B.

Z-wave

C.

802.11ax

D.

C-band