Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 6

Questions 51

In SecOps, what are two of the components included in the identify stage? (Choose two.)

Options:
A.

Initial Research

B.

Change Control

C.

Content Engineering

D.

Breach Response

Paloalto Networks Practitioner Premium Access
Questions 52

What is the ptrpose of automation in SOAR?

Options:
A.

To provide consistency in response to security issues

B.

To give only administrators the ability to view logs

C.

To allow easy manual entry of changes to security templates

D.

To complicate programming for system administration -

Questions 53

Routing Information Protocol (RIP), uses what metric to determine how network traffic should flow?

Options:
A.

Shortest Path

B.

Hop Count

C.

Split Horizon

D.

Path Vector

Questions 54

An administrator finds multiple gambling websites in the network traffic log.

What can be created to dynamically block these websites?

Options:
A.

URL category

B.

Custom signatures

C.

Decryption policy

D.

Application group

Questions 55

What are two functions of an active monitoring system? (Choose two.)

Options:
A.

Preventing specific changes from being affected in the system

B.

Determining system health using unaltered system data

C.

Detecting micro-services in a default configuration

D.

Using probes to establish potential load issues

Questions 56

Which component of the AAA framework regulates user access and permissions to resources?

Options:
A.

Authorization

B.

Allowance

C.

Accounting

D.

Authentication

Questions 57

Which endpoint product from Palo Alto Networks can help with SOC visibility?

Options:
A.

STIX

B.

Cortex XDR

C.

WildFire

D.

AutoFocus

Questions 58

Match the description with the VPN technology.

Practitioner Question 58

Options:
Questions 59

Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?

Options:
A.

NetOps

B.

SecOps

C.

SecDevOps

D.

DevOps

Questions 60

On an endpoint, which method should you use to secure applications against exploits?

Options:
A.

endpoint-based firewall

B.

strong user passwords

C.

full-disk encryption

D.

software patches