Vcehome > Palo Alto Networks > Cybersecurity Associate > PCCSA > PCCSA Online Practice Questions and Answers

PCCSA Online Practice Questions and Answers

Questions 4

Identify a weakness of a perimeter-based network security strategy to protect an organization's endpoint systems.

A. It cannot identify command-and-control traffic.

B. It cannot monitor all potential network ports.

C. It assumes that all internal devices are untrusted.

D. It assumes that every internal endpoint can be trusted.

Browse 79 Q&As
Questions 5

Which type of attack floods a target with ICMP requests?

A. route table poisoning

B. reconnaissance

C. IP spoofing

D. denial-of-service

Browse 79 Q&As
Questions 6

Which two items operate at the network layer in the OSI network model? (Choose two.)

A. IP address

B. router

C. switch

D. MAC address

Browse 79 Q&As
Questions 7

What is an example of a distance-vector routing protocol?

A. OSPF

B. BGP

C. RIP D. IGRP

Browse 79 Q&As
Questions 8

Which type of firewall monitors traffic streams from beginning to end?

A. circuit-level gateway

B. stateless

C. stateful

D. packet filter

Browse 79 Q&As
Questions 9

Company policy allows employees to access the internet. While searching for office supplies on the internet, a corporate user mistypes a URL, connects to a malicious website, and unknowingly downloads malware.

Which action should have been taken to prevent the malware download but still allow user access to the internet?

A. deploy a firewall with content filtering capabilities on the corporate perimeter

B. allow only encrypted HTTPS access to the internet

C. configure digital certificates for all users to authenticate internet downloads

D. permit web connections only to TCP port 443

Browse 79 Q&As
Questions 10

Which type of cloud computing service provides access to email and word processing applications running in a cloud infrastructure?

A. software as a service

B. computing as a service

C. platform as a service

D. infrastructure as a service

Browse 79 Q&As
Questions 11

What is the result of deploying virtualization in your data center?

A. reduced security threat

B. reduced operational costs

C. increased hardware capital costs

D. increased host provisioning

Browse 79 Q&As
Questions 12

Which type of adversary would execute a website defacement attack to promote a political agenda?

A. script kiddie

B. hacktivist

C. gray hat hacker

D. state sponsored hacker

Browse 79 Q&As
Questions 13

Palo Alto Networks Traps is natively integrated with which Palo Alto Networks offering to protect against unknown exploits and malware threats?

A. MineMeld

B. WildFire

C. Content-ID

D. AutoFocus

Browse 79 Q&As
Exam Code: PCCSA
Exam Name: Palo Alto Networks Certified Cybersecurity Associate
Last Update: May 10, 2024
Questions: 79 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99