New Year Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 7

Questions 61

In which step of the cyber-attack lifecycle do hackers embed intruder code within seemingly innocuous files?

Options:
A.

weaponization

B.

reconnaissance

C.

exploitation

D.

delivery

Paloalto Networks Practitioner Premium Access
Questions 62

Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?

Options:
A.

Use of non-standard ports

B.

Hiding within SSL encryption

C.

Port hopping

D.

Tunneling within commonly used services

Questions 63

Which security tool provides policy enforcement for mobile users and remote networks?

Options:
A.

Service connection

B.

Prisma Access

C.

Prisma Cloud

D.

Digital experience management

Questions 64

What are two limitations of signature-based anti-malware software? (Choose two.)

Options:
A.

It is unable to detect polymorphic malware.

B.

It requires samples lo be buffered

C.

It uses a static file for comparing potential threats.

D.

It only uses packet header information.

Questions 65

What are two functions of an active monitoring system? (Choose two.)

Options:
A.

Preventing specific changes from being affected in the system

B.

Determining system health using unaltered system data

C.

Detecting micro-services in a default configuration

D.

Using probes to establish potential load issues

Questions 66

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?

Options:
A.

Expedition

B.

Cortex XDR

C.

AutoFocus

D.

App-ID

Questions 67

Which architecture model uses virtual machines (VMs) in a public cloud environment?

Options:
A.

Kubernetes

B.

Serverless

C.

Docker

D.

Host-based

Questions 68

What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?

Options:
A.

run a static analysis

B.

check its execution policy

C.

send the executable to WildFire

D.

run a dynamic analysis