New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 5

Questions 41

What is a key advantage and key risk in using a public cloud environment?

Options:
A.

Multi-tenancy

B.

Dedicated Networks

C.

Dedicated Hosts

D.

Multiplexing

Paloalto Networks Practitioner Premium Access
Questions 42

How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?

Options:
A.

DevSecOps improves pipeline security by assigning the security team as the lead team for continuous deployment

B.

DevSecOps ensures the pipeline has horizontal intersections for application code deployment

C.

DevSecOps unites the Security team with the Development and Operations teams to integrate security into the CI/CD pipeline

D.

DevSecOps does security checking after the application code has been processed through the CI/CD pipeline

Questions 43

Which activity is a technique in the MITRE ATT&CK framework?

Options:
A.

Credential access

B.

Lateral movement

C.

Resource development

D.

Account discovery

Questions 44

What are two examples of an attacker using social engineering? (Choose two.)

Options:
A.

Convincing an employee that they are also an employee

B.

Leveraging open-source intelligence to gather information about a high-level executive

C.

Acting as a company representative and asking for personal information not relevant to the reason for their call

D.

Compromising a website and configuring it to automatically install malicious files onto systems that visit the page

Questions 45

If an endpoint does not know how to reach its destination, what path will it take to get there?

Options:
A.

The endpoint will broadcast to all connected network devices.

B.

The endpoint will not send the traffic until a path is clarified.

C.

The endpoint will send data to the specified default gateway.

D.

The endpoint will forward data to another endpoint to send instead.

Questions 46

How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?

Options:
A.

It creates an encrypted connection to the company's data center.

B.

It performs SSL decryption to give visibility into user traffic.

C.

II prevents sensitive data from leaving the network.

D.

II automates the ingestion and aggregation of indicators.

Questions 47

Which two statements are true about servers in a demilitarized zone (DMZ)? (Choose two.)

Options:
A.

They can be accessed by traffic from the internet.

B.

They are located in the internal network.

C.

They can expose servers in the internal network to attacks.

D.

They are isolated from the internal network.

Questions 48

What is the purpose of SIEM?

Options:
A.

Securing cloud-based applications

B.

Automating the security team’s incident response

C.

Real-time monitoring and analysis of security events

D.

Filtering webpages employees are allowed to access

Questions 49

Under which category does an application that is approved by the IT department, such as Office 365, fall?

Options:
A.

unsanctioned

B.

prohibited

C.

tolerated

D.

sanctioned

Questions 50

In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)

Options:
A.

SaaS

B.

PaaS

C.

On-premises

D.

IaaS