Palo Alto Networks Certified Cybersecurity Entry-level Technician PCCET Exam Questions

Page: 1 / 14
Total 158 questions
Question 1
Question 2

Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?



Answer : C

App-ID technology leverages the power of the broad global community to provide continuous identification, categorization, and granular risk-based control of known and previously unknown SaaS applications, ensuring new applications are discovered automatically as they become popular.


Question 3
Question 4

Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?



Answer : D

The URL Filtering service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites that host malware and phishing pages.


Question 5
Question 6

Which core component is used to implement a Zero Trust architecture?



Answer : C

'Remember that a trust zone is not intended to be a ''pocket of trust'' where systems (and therefore threats) within the zone can communicate freely and directly with each other. For a full Zero Trust implementation, the network would be configured to ensure that all communications traffic, including traffic between devices in the same zone, is intermediated by the corresponding Zero Trust Segmentation Platform.'


Question 7

Which type of Wi-Fi attack depends on the victim initiating the connection?



Answer : A

An evil twin is a type of Wi-Fi attack that involves setting up a fake malicious Wi-Fi hotspot with the same name as a legitimate network to trick users into connecting to it. The attacker can then intercept the user's data, such as passwords, credit card numbers, or personal information. The victim initiates the connection by choosing the fake network from the list of available Wi-Fi networks, thinking it is the real one. The attacker can also use a deauthentication attack to disconnect the user from the legitimate network and force them to reconnect to the fake one.Reference:

Types of Wi-Fi Attacks You Need to Guard Your Business Against - TechGenix

Types of Wireless and Mobile Device Attacks - GeeksforGeeks

The 5 most dangerous Wi-Fi attacks, and how to fight them

What are Wi-Fi Attacks & How to Fight - Tech Resider


Page:    1 / 14   
Total 158 questions