Download Palo Alto Networks.PCCSA.PracticeTest.2019-04-15.23q.vcex

Download Exam

File Info

Exam Palo Alto Networks Certified Cybersecurity Associate
Number PCCSA
File Name Palo Alto Networks.PCCSA.PracticeTest.2019-04-15.23q.vcex
Size 13 KB
Posted Apr 15, 2019
Download Palo Alto Networks.PCCSA.PracticeTest.2019-04-15.23q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

Which option describes a characteristic of a distributed denial-of-service attack?


  1. uses multiple types of malware to corrupt system services
  2. uses a single remote host to delete data from multiple target servers
  3. uses a single remote host to flood a target network with traffic
  4. uses a botnet to flood traffic to a target network
Correct answer: D



Question 2

What is a component of a public key infrastructure? 


  1. Key Distribution Center
  2. KDC ticket
  3. SSH key
  4. certificate authority
Correct answer: D
Explanation:



Question 3

What does a hypervisor enable?


  1. high-speed searching of already aggregated security log files
  2. high-speed aggregation and viewing of security log files
  3. multiple physical machines to be configured into a high-performance cluster
  4. multiple guest operating systems to run on a single physical machine
Correct answer: D



Question 4

Identify a weakness of a perimeter-based network security strategy to protect an organization’s endpoint systems.


  1. It cannot identify command-and-control traffic.
  2. It cannot monitor all potential network ports.
  3. It assumes that all internal devices are untrusted.
  4. It assumes that every internal endpoint can be trusted.
Correct answer: D



Question 5

Which well-known port is associated with the Simple Mail Transfer Protocol?


  1. 143
  2. 25
  3. 997
  4. 40 
Correct answer: B



Question 6

To which type of organization does the PCI DSS apply?


  1. any organization that accepts, transmits, or stores any cardholder data
  2. organizations that only accept cardholder data regardless of size or number of transactions
  3. only organization larger than 100 employees that accept, transmit, or store any cardholder data
  4. organization that only transmit data regardless of size or number of transactions
Correct answer: A



Question 7

Which mobile device management feature prevents jailbreaking or rooting?


  1. software distribution
  2. malware protection
  3. policy enforcement
  4. data loss prevention
Correct answer: C



Question 8

What are two methods to securely transmit personally identifiable information? (Choose two.) 


  1. data checksumming
  2. data fragmentation
  3. data encryption
  4. encrypted tunnels
Correct answer: CD



Question 9

What is the primary purpose of using encryption as part of your network data security architecture?


  1. authorization
  2. confidentiality
  3. integrity
  4. authentication
Correct answer: B



Question 10

A firewall located on an organization’s network perimeter can be used to protect against which type of attack?


  1. a malicious SaaS application file accessed from an unmanaged mobile phone
  2. ransomware installed from an infected USB drive
  3. malware installed on the laptop by a disgruntled employee
  4. a malicious PDF file located on an internet website
Correct answer: D









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files