Exam Domain 1 - Palo Alto Networks Cybersecurity Portfolio Core

¡Supera tus tareas y exámenes ahora con Quizwiz!

1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? (Choose three.) A. securing operations response B. securing the enterprise C. securing third-party application access D. securing the cloud E. securing the internet of things

1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? (Choose three.) A. securing operations response B. securing the enterprise C. D. securing the cloud E.

10. Which approach most accurately defines the Palo Alto Networks SP3 architecture? A. prioritize first B. sequential processing C. scan it all, scan it once D. Zero Trust segmentation platform

10. Which approach most accurately defines the Palo Alto Networks SP3 architecture? C. scan it all, scan it once

11. What is the result of using a stream-based architectural design? A. superior performance B. increased latency C. detailed logging D. increased functionality

11. What is the result of using a stream-based architectural design? A. superior performance

12. Which security model does Palo Alto Networks recommend that you deploy? A. separation-of-trust B. Zero Trust C. trust-then-verify D. never trust

12. Which security model does Palo Alto Networks recommend that you deploy? B. Zero Trust

13. The Zero Trust model is implemented to specifically inspect which type of traffic? A. east-west B. north-south C. left-right D. up-down

13. The Zero Trust model is implemented to specifically inspect which type of traffic? A. east-west

14. What are the three main concepts of Zero Trust? (Choose three.) A. All resources are accessed in a secure manner, regardless of location. B. Access control is on a "need-to-know" basis and is strictly enforced. C. Credentials need to be verified. D. All traffic is logged and inspected. E. Internal users are trusted implicitly. F. External users are trusted explicitly.

14. What are the three main concepts of Zero Trust? (Choose three.) A. All resources are accessed in a secure manner, regardless of location. B. Access control is on a "need-to-know" basis and is strictly enforced. D. All traffic is logged and inspected.

15. Which two statements are true about the Zero Trust model? (Choose two.) A. Traffic is inspected laterally. B. Traffic is inspected east-west. C. Internal traffic is implicitly trusted. D. External traffic is implicitly trusted

15. Which two statements are true about the Zero Trust model? (Choose two.) A. Traffic is inspected laterally. B. Traffic is inspected east-west.

16. Which three Palo Alto Networks products secure your network? (Choose three.) A. MineMerge B. Prisma SaaS C. URL filtering© 2018-2020 Palo Alto Networks 182 D. Containers E. TrapContent F. WildFire

16. Which three Palo Alto Networks products secure your network? (Choose three.) B. Prisma SaaS C. URL filtering© 2018-2020 Palo Alto Networks 182 F. WildFire

17. True or false: Blockage of just one stage in the cyberattack lifecycle will protect a company's network from attack. A. true B. false

17. True or false: Blockage of just one stage in the cyberattack lifecycle will protect a company's network from attack. A. true

18. What are two stages of the cyberattack lifecycle? (Choose two.) A. weaponization and delivery B. manipulation C. extraction D. command and control

18. What are two stages of the cyberattack lifecycle? (Choose two.) A. weaponization and delivery D. command and control

19. Command and control can be prevented through which two methods? (Choose two.) A. exploitation B. DNS Sinkholing C. URL filtering D. reconnaissance

19. Command and control can be prevented through which two methods? (Choose two.) B. DNS Sinkholing C. URL filtering

20. Exploitation can be mitigated by which two actions? (Choose two.) A. keeping systems patched B. using local accounts C. blocking known and unknown vulnerability exploits on the endpoint D. providing admin credentials

20. Exploitation can be mitigated by which two actions? (Choose two.) A. keeping systems patched C. blocking known and unknown vulnerability exploits on the endpoint

3. Which cloud-delivered security service provides instant access to community-based threat data? A. Prisma SaaS B. AutoFocus C. Unit 42 D. Cortex XDR

3. Which cloud-delivered security service provides instant access to community-based threat data? A. B. AutoFocus C. D.

4. Which cloud-delivered security service provides security and connectivity for branches and mobile users? A. Cortex XSOAR B. Cortex XDR C. AutoFocus D. Prisma Access

4. Which cloud-delivered security service provides security and connectivity for branches and mobile users? A. B. C. D. Prisma Access

6. Which Palo Alto Networks firewall feature provides all the following abilities? • Stops malware, exploits, and ransomware before they can compromise endpoints • Provides protection while endpoints are online and offline, on network and off • Coordinates enforcement with network and cloud security to prevent successful attacks • Detects threats and automates containment to minimize impact • Creates zero-day malware signatures with cloud-based threat analysis • Integrates with Palo Alto Networks Cortex Data Lake A. Cortex XDR B. Prisma SaaS C. WildFire D. AutoFocus

6. Which Palo Alto Networks firewall feature provides all the following abilities? • Stops malware, exploits, and ransomware before they can compromise endpoints • Provides protection while endpoints are online and offline, on network and off • Coordinates enforcement with network and cloud security to prevent successful attacks • Detects threats and automates containment to minimize impact • Creates zero-day malware signatures with cloud-based threat analysis • Integrates with Palo Alto Networks Cortex Data Lake A. Cortex XDR B. C. D.

7. Which three management features does the Control Plane provide? (Choose three.) A. security processing B. logging C. reporting D. firewall configuration E. signature matching F. network processing

7. Which three management features does the Control Plane provide? (Choose three.) B. logging C. reporting D. firewall configuration

8. Which three data processing features does the data plane provide? (Choose three.) A. security processing B. logging C. reporting D. firewall configuration E. signature matching F. network processing

8. Which three data processing features does the data plane provide? (Choose three.) A. security processing E. signature matching F. network processing

9. What are three components of the Network Processing module? (Choose three.) A. QoS B. NAT C. App-ID D. flow control E. URL match F. spyware

9. What are three components of the Network Processing module? (Choose three.) A. QoS B. NAT D. flow control

What are four components of the Palo Alto Networks Cybersecurity Portfolio? (Choose four.) A. Cortex DynamicDNS B. WildFire C. Cortex XDR D. OpenConnect E. Prisma Access F. AutoFocus

What are four components of the Palo Alto Networks Cybersecurity Portfolio? (Choose four.) A. B. WildFire C. Cortex XDR D. E. Prisma Access F. AutoFocus

Which Palo Alto Networks Cybersecurity Portfolio product provides access to applications from Palo Alto Networks, third parties, and customers? A. WildFire B. Cortex Data Lake C. Network Security D. Prisma Access

Which Palo Alto Networks Cybersecurity Portfolio product provides access to applications from Palo Alto Networks, third parties, and customers? A. B. Cortex Data Lake C. D.


Conjuntos de estudio relacionados

What do the initials ICD stand for?

View Set

Cultural geography chapter 6 test

View Set

Female Reproduction (Lec 13 & 14)

View Set

Chapter 3: Texas in the Federal System

View Set

Music 118B (Chapter 9 - Chapter 16)

View Set

Khan Academy Unit Questions (3?)

View Set