New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 3

Questions 21

What protocol requires all routers in the same domain to maintain a map of the network?

Options:
A.

EIGRP

B.

Static

C.

RIP

D.

OSPF

Paloalto Networks Practitioner Premium Access
Questions 22

What differentiates knowledge-based systems from behavior-based systems?

Options:
A.

Behavior-based systems find the data that knowledge-based systems store.

B.

Knowledge-based systems pull from a previously stored database that distinguishes “bad”. C. Knowledge-based systems try to find new, distinct traits to find “bad” things.

C.

Behavior-based systems pull from a previously stored database that distinguishes “bad”.

Questions 23

Which statement describes the process of application allow listing?

Options:
A.

It allows only trusted files, applications, and processes to run.

B.

It creates a set of specific applications that do not run on the system.

C.

It encrypts application data to protect the system from external threats.

D.

It allows safe use of applications by scanning files for malware.

Questions 24

Which two services does a managed detection and response (MDR) solution provide? (Choose two.)

Options:
A.

Improved application development

B.

Incident impact analysis

C.

Periodic firewall updates

D.

Proactive threat hunting

Questions 25

What is required for a SIEM to operate correctly to ensure a translated flow from the system of interest to the SIEM data lake?

Options:
A.

connectors and interfaces

B.

infrastructure and containers

C.

containers and developers

D.

data center and UPS

Questions 26

A user is given access to a service that gives them access to cloud-hosted physical and virtual servers, storage, and networking.

Which NIST cloud service model is this?

Options:
A.

IaaS

B.

SaaS

C.

PaaS

D.

CaaS

Questions 27

How does adopting a serverless model impact application development?

Options:
A.

costs more to develop application code because it uses more compute resources

B.

slows down the deployment of application code, but it improves the quality of code development

C.

reduces the operational overhead necessary to deploy application code

D.

prevents developers from focusing on just the application code because you need to provision the underlying infrastructure to run the code

Questions 28

Which protocol is used by both internet service providers (ISPs) and network service providers (NSPs)?

Options:
A.

Routing Information Protocol (RIP)

B.

Border Gateway Protocol (BGP)

C.

Open Shortest Path First (OSPF)

D.

Split horizon

Questions 29

Which type of malware takes advantage of a vulnerability on an endpoint or server?

Options:
A.

technique

B.

patch

C.

vulnerability

D.

exploit

Questions 30

Which of the Cloud-Delivered Security Services (CDSS) will detect zero-day malware by using inline cloud machine learning (ML) and sandboxing?

Options:
A.

DNS security

B.

Advanced WildFire

C.

loT security

D.

Advanced Threat Prevention