Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 3

Questions 21

What does SIEM stand for?

Options:
A.

Security Infosec and Event Management

B.

Security Information and Event Management

C.

Standard Installation and Event Media

D.

Secure Infrastructure and Event Monitoring

Paloalto Networks Practitioner Premium Access
Questions 22

A doctor receives an email about her upcoming holiday in France. When she clicks the URL website link in the email, the connection is blocked by her office firewall because it's a known malware website. Which type of attack includes a link to a malware website in an email?

Options:
A.

whaling

B.

phishing

C.

pharming

D.

spam

Questions 23

The customer is responsible only for which type of security when using a SaaS application?

Options:
A.

physical

B.

platform

C.

data

D.

infrastructure

Questions 24

Anthem server breaches disclosed Personally Identifiable Information (PII) from a number of its servers. The infiltration by hackers was attributed to which type of vulnerability?

Options:
A.

an intranet-accessed contractor’s system that was compromised

B.

exploitation of an unpatched security vulnerability

C.

access by using a third-party vendor’s password

D.

a phishing scheme that captured a database administrator’s password

Questions 25

Which product from Palo Alto Networks enables organizations to prevent successful cyberattacks as well as simplify and strengthen security processes?

Options:
A.

Expedition

B.

AutoFocus

C.

MineMeld

D.

Cortex XDR

Questions 26

What differentiates knowledge-based systems from behavior-based systems?

Options:
A.

Behavior-based systems find the data that knowledge-based systems store.

B.

Knowledge-based systems pull from a previously stored database that distinguishes “bad”. C. Knowledge-based systems try to find new, distinct traits to find “bad” things.

C.

Behavior-based systems pull from a previously stored database that distinguishes “bad”.

Questions 27

Which network firewall primarily filters traffic based on source and destination IP address?

Options:
A.

Proxy

B.

Stateful

C.

Stateless

D.

Application

Questions 28

Which of the following is a Routed Protocol?

Options:
A.

Routing Information Protocol (RIP)

B.

Transmission Control Protocol (TCP)

C.

Internet Protocol (IP)

D.

Domain Name Service (DNS)

Questions 29

What is the recommended method for collecting security logs from multiple endpoints?

Options:
A.

Leverage an EDR solution to request the logs from endpoints.

B.

Connect to the endpoints remotely and download the logs.

C.

Configure endpoints to forward logs to a SIEM.

D.

Build a script that pulls down the logs from all endpoints.

Questions 30

How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?

Options:
A.

DevSecOps improves pipeline security by assigning the security team as the lead team for continuous deployment

B.

DevSecOps ensures the pipeline has horizontal intersections for application code deployment

C.

DevSecOps unites the Security team with the Development and Operations teams to integrate security into the CI/CD pipeline

D.

DevSecOps does security checking after the application code has been processed through the CI/CD pipeline