Palo Alto Networks PCCET Palo Alto Networks Certified Cybersecurity Entry-level Technician Exam Practice Test

Page: 1 / 14
Total 158 questions
Question 1

Which network firewall operates up to Layer 4 (Transport layer) of the OSI model and maintains information about the communication sessions which have been established between hosts on trusted and untrusted networks?



Answer : C

Stateful packet inspection firewalls Second-generation stateful packet inspection (also known as dynamic packet filtering) firewalls have the following characteristics:

They operate up to Layer 4 (Transport layer) of the OSI model and maintain state information about the communication sessions that have been established between hosts on the trusted and untrusted networks.

They inspect individual packet headers to determine source and destination IP address, protocol (TCP, UDP, and ICMP), and port number (during session establishment only) to

determine whether the session should be allowed, blocked, or dropped based on configured

firewall rules.

After a permitted connection is established between two hosts, the firewall creates and

deletes firewall rules for individual connections as needed, thus effectively creating a tunnel that allows traffic to flow between the two hosts without further inspection of individual packets during the session.

This type of firewall is very fast, but it is port-based and it is highly dependent on the

trustworthiness of the two hosts because individual packets aren't inspected after the

connection is established.


Question 2

Which core component is used to implement a Zero Trust architecture?



Answer : C

'Remember that a trust zone is not intended to be a ''pocket of trust'' where systems (and therefore threats) within the zone can communicate freely and directly with each other. For a full Zero Trust implementation, the network would be configured to ensure that all communications traffic, including traffic between devices in the same zone, is intermediated by the corresponding Zero Trust Segmentation Platform.'


Question 3

What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?



Question 4

Which type of Wi-Fi attack depends on the victim initiating the connection?



Answer : A

An evil twin is a type of Wi-Fi attack that involves setting up a fake malicious Wi-Fi hotspot with the same name as a legitimate network to trick users into connecting to it. The attacker can then intercept the user's data, such as passwords, credit card numbers, or personal information. The victim initiates the connection by choosing the fake network from the list of available Wi-Fi networks, thinking it is the real one. The attacker can also use a deauthentication attack to disconnect the user from the legitimate network and force them to reconnect to the fake one.Reference:

Types of Wi-Fi Attacks You Need to Guard Your Business Against - TechGenix

Types of Wireless and Mobile Device Attacks - GeeksforGeeks

The 5 most dangerous Wi-Fi attacks, and how to fight them

What are Wi-Fi Attacks & How to Fight - Tech Resider


Question 5
Question 6

In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?



Answer : C

Command and Control: Attackers establish encrypted communication channels back to command-and-control (C2) servers across the internet so that they can modify their attack objectives and methods as additional targets of opportunity are identified within the victim network, or to evade any new security countermeasures that the organization may attempt to deploy if attack artifacts are discovered.


Question 7

Which organizational function is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues?



Answer : B

SecOps is the organizational function that is responsible for security automation and eventual vetting of the solution to help ensure consistency through machine-driven responses to security issues. SecOps is a collaboration between security and operations teams that aims to align their goals, processes, and tools to improve security posture and efficiency. SecOps can leverage automation to simplify and accelerate security tasks, such as threat detection, incident response, vulnerability management, compliance enforcement, and more. Security automation can also reduce human errors, enhance scalability, and free up resources for more strategic initiatives.Reference:

SecOpsfrom Palo Alto Networks

What is security automation?from Red Hat

What is Security Automation?from Check Point Software


Page:    1 / 14   
Total 158 questions