Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 5

Questions 41

Which element of the security operations process is concerned with using external functions to help achieve goals?

Options:
A.

interfaces

B.

business

C.

technology

D.

people

Paloalto Networks Practitioner Premium Access
Questions 42

Which aspect of a SaaS application requires compliance with local organizational security policies?

Options:
A.

Types of physical storage media used

B.

Data-at-rest encryption standards

C.

Acceptable use of the SaaS application

D.

Vulnerability scanning and management

Questions 43

What is an operation of an Attack Surface Management (ASM) platform?

Options:
A.

It scans assets in the cloud space for remediation of compromised sanctioned SaaS applications.

B.

It continuously identifies all internal and external internet-connected assets for potential attack vectors and exposures.

C.

It identifies and monitors the movement of data within, into, and out of an organization's network.

D.

It detects and remediates misconfigured security settings in sanctioned SaaS applications through monitoring.

Questions 44

On which security principle does virtualization have positive effects?

Options:
A.

integrity

B.

confidentiality

C.

availability

D.

non-repudiation

Questions 45

Which core component is used to implement a Zero Trust architecture?

Options:
A.

VPN Concentrator

B.

Content Identification

C.

Segmentation Platform

D.

Web Application Zone

Questions 46

Which native Windows application can be used to inspect actions taken at a specific time?

Options:
A.

Event Viewer

B.

Timeline inspector

C.

Task Manager

D.

Task Scheduler

Questions 47

Which of the following is an AWS serverless service?

Options:
A.

Beta

B.

Kappa

C.

Delta

D.

Lambda

Questions 48

What are two limitations of signature-based anti-malware software? (Choose two.)

Options:
A.

It is unable to detect polymorphic malware.

B.

It requires samples lo be buffered

C.

It uses a static file for comparing potential threats.

D.

It only uses packet header information.

Questions 49

Which type of system collects data and uses correlation rules to trigger alarms?

Options:
A.

SIM

B.

SIEM

C.

UEBA

D.

SOAR

Questions 50

Which VM-Series virtual firewall cloud deployment use case reduces your environment's attack surface?

Options:
A.

O Multicloud

B.

O 5G -

C.

Micro-segmentation

D.

DevOps