PCCET練習問題集で検証済みで更新された77問題あります [Q31-Q47]

Share

PCCET練習問題集で検証済みで更新された77問題あります

更新されたPCCET試験問題集でPDF問題とテストエンジン

質問 31
Which TCP/IP sub-protocol operates at the Layer7 of the OSI model?

  • A. MAC
  • B. SNMP
  • C. UDP
  • D. NFS

正解: B

 

質問 32
Which tool supercharges security operations center (SOC) efficiency with the world's most comprehensive operating platform for enterprise security?

  • A. Cortex XDR
  • B. Prisma SAAS
  • C. Cortex XSOAR
  • D. WildFire

正解: C

 

質問 33
When signature-based antivirus software detects malware, what three things does it do to provide protection?
(Choose three.)

  • A. remove the infected file's extension
  • B. decrypt the infected file using base64
  • C. alert system administrators
  • D. quarantine the infected file
  • E. delete the infected file

正解: A,D,E

解説:
Explanation

 

質問 34
Which model would a customer choose if they want full control over the operating system(s) running on their cloud computing platform?

  • A. IaaS
  • B. SaaS
  • C. PaaS
  • D. DaaS

正解: A

 

質問 35
Which option describes the "selective network security virtualization" phase of incrementally transforming data centers?

  • A. during the selective network security virtualization phase, all intra-host traffic is encapsulated and encrypted using the IPSEC protocol
  • B. during the selective network security virtualization phase, all intra-host communication paths are strictly controlled
  • C. during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy server
  • D. during the selective network security virtualization phase, all intra-host traffic is load balanced

正解: B

 

質問 36
Which endpoint tool or agent can enact behavior-based protection?

  • A. AutoFocus
  • B. DNS Security
  • C. MineMeld
  • D. Cortex XDR

正解: D

 

質問 37
Which option is an example of a North-South traffic flow?

  • A. Lateral movement within a cloud or data center
  • B. Traffic between an internal server and internal user
  • C. Client-server interactions that cross the edge perimeter
  • D. An internal three-tier application

正解: C

 

質問 38
Given the graphic, match each stage of the cyber-attack lifecycle to its description.

正解:

解説:

 

質問 39
Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?

  • A. DevOps
  • B. SecOps
  • C. NetOps
  • D. SecDevOps

正解: B

 

質問 40
How does Prisma SaaS provide protection for Sanctioned SaaS applications?

  • A. Prisma SaaS connects to an organizations internal print and file sharing services to provide protection and sharing visibility
  • B. Prisma SaaS connects directly to sanctioned external service providers SaaS application service to provide protection and sharing visibility
  • C. Prisma access uses Uniform Resource Locator (URL) Web categorization to provide protection and sharing visibility
  • D. Prisma SaaS does not provide protection for Sanctioned SaaS applications because they are secure

正解: B

 

質問 41
Which characteristic of serverless computing enables developers to quickly deploy application code?

  • A. Uploading cloud service autoscaling services to deploy more virtual machines to run their application code based on user demand
  • B. Using cloud service spot pricing to reduce the cost of using virtual machines to run their application code
  • C. Using Container as a Service (CaaS) to deploy application containers to run their code.
  • D. Uploading the application code itself, without having to provision a full container image or any OS virtual machine components

正解: A

 

質問 42
A native hypervisor runs:

  • A. within an operating system's environment
  • B. with extreme demands on network throughput
  • C. directly on the host computer's hardware
  • D. only on certain platforms

正解: C

 

質問 43
How does adopting a serverless model impact application development?

  • A. costs more to develop application code because it uses more compute resources
  • B. prevents developers from focusing on just the application code because you need to provision the underlying infrastructure to run the code
  • C. reduces the operational overhead necessary to deploy application code
  • D. slows down the deployment of application code, but it improves the quality of code development

正解: C

 

質問 44
Which IPsec feature allows device traffic to go directly to the Internet?

  • A. d.Authentication Header (AH)
  • B. IKE Security Association
  • C. Split tunneling
  • D. Diffie-Hellman groups

正解: C

 

質問 45
Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?

  • A. Static packet-filter
  • B. Stateless
  • C. Group policy
  • D. Stateful

正解: D

 

質問 46
Which not-for-profit organization maintains the common vulnerability exposure catalog that is available through their public website?

  • A. Office of Cyber Security and Information Assurance
  • B. MITRE
  • C. Department of Homeland Security
  • D. Cybersecurity Vulnerability Research Center

正解: B

 

質問 47
......

最新(2022)Palo Alto Networks PCCET試験問題集:https://www.goshiken.com/Palo-Alto-Networks/PCCET-mondaishu.html

最適な練習法にはPalo Alto Networks PCCET試験の素晴らしいPCCET試験問題PDF:https://drive.google.com/open?id=1DeY6MDtQseH76RThMDs3FzGnaU0EnkoP