Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 4

Questions 31

Which three services are part of Prisma SaaS? (Choose three.)

Options:
A.

Data Loss Prevention

B.

DevOps

C.

Denial of Service

D.

Data Exposure Control

E.

Threat Prevention

Paloalto Networks Practitioner Premium Access
Questions 32

What type of DNS record maps an IPV6 address to a domain or subdomain to another hostname?

Options:
A.

SOA

B.

NS

C.

AAAA

D.

MX

Questions 33

Which TCP/IP sub-protocol operates at the Layer7 of the OSI model?

Options:
A.

UDP

B.

MAC

C.

SNMP

D.

NFS

Questions 34

What is the function of an endpoint detection and response (EDR) tool?

Options:
A.

To provide organizations with expertise for monitoring network devices

B.

To ingest alert data from network devices

C.

To monitor activities and behaviors for investigation of security incidents on user devices

D.

To integrate data from different products in order to provide a holistic view of security posture

Questions 35

Which two statements describe the Jasager attack? (Choose two.)

Options:
A.

□ The victim must manually choose the attacker s access point

B.

□ It actively responds to beacon reguests.

C.

□ It tries to get victims to conned at random.

D.

□ The attacker needs to be wilhin close proximity of the victim.

Questions 36

Which Palo Alto subscription service identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs) through static and dynamic analysis in a scalable, virtual environment?

Options:
A.

DNS Security

B.

URL Filtering

C.

WildFire

D.

Threat Prevention

Questions 37

Which subnet does the host 192.168.19.36/27 belong?

Options:
A.

192.168.19.0

B.

192.168.19.16

C.

192.168.19.64

D.

192.168.19.32

Questions 38

Which service is encompassed by serverless architecture?

Options:
A.

Infrastructure as a Service (laaS)

B.

Function as a Service (FaaS)

C.

Security as a Service (SaaS)

D.

Authentication as a Service

Questions 39

Which capability of a Zero Trust network security architecture leverages the combination of application, user, and content identification to prevent unauthorized access?

Options:
A.

Cyber threat protection

B.

Inspection of all traffic

C.

Least privileges access control

D.

Network segmentation

Questions 40

Which methodology does Identity Threat Detection and Response (ITDR) use?

Options:
A.

Behavior analysis

B.

Comparison of alerts to signatures

C.

Manual inspection of user activities

D.

Rule-based activity prioritization