Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks Practitioner Practice Exam with Questions & Answers | Set: 7

Questions 61

Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?

Options:
A.

SaaS

B.

DaaS

C.

PaaS

D.

IaaS

Paloalto Networks Practitioner Premium Access
Questions 62

Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?

Options:
A.

during the selective network security virtualization phase, all intra-host communication paths are strictly controlled

B.

during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy server

C.

during the selective network security virtualization phase, all intra-host traffic is encapsulated and encrypted using the IPSEC protocol

D.

during the selective network security virtualization phase, all intra-host traffic is load balanced

Questions 63

In which type of Wi-Fi attack does the attacker intercept and redirect the victim’s web traffic to serve content from a web server it controls?

Options:
A.

Evil Twin

B.

Emotet

C.

Meddler-in-the-middle

D.

Jasager

Questions 64

What are two characteristics of an advanced persistent threat (APT)? (Choose two.)

Options:
A.

Multiple attack vectors

B.

Repeated pursuit of objective

C.

Reduced interaction time

D.

Tendency to isolate hosts

Questions 65

Which two statements apply to SaaS financial botnets? (Choose two.)

Options:
A.

They are larger than spamming or DDoS botnets.

B.

They are sold as kits that allow attackers to license the code.

C.

They are a defense against spam attacks.

D.

They are used by attackers to build their own botnets.

Questions 66

What is a key advantage and key risk in using a public cloud environment?

Options:
A.

Multi-tenancy

B.

Dedicated Networks

C.

Dedicated Hosts

D.

Multiplexing

Questions 67

How does Cortex XSOAR Threat Intelligence Management (TIM) provide relevant threat data to analysts?

Options:
A.

It creates an encrypted connection to the company's data center.

B.

It performs SSL decryption to give visibility into user traffic.

C.

II prevents sensitive data from leaving the network.

D.

II automates the ingestion and aggregation of indicators.

Questions 68

Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?

Options:
A.

Cloud

B.

Physical

C.

Virtual

D.

Containerized