Free Palo Alto Networks Cybersecurity-Practitioner Exam Questions (page: 4)

What are two common lifecycle stages for an advanced persistent threat (APT) that is infiltrating a network? (Choose two.)

  1. Lateral movement
  2. Communication with covert channels
  3. Deletion of critical data
  4. Privilege escalation

Answer(s): A,D

Explanation:

Lateral movement is a key stage where the attacker moves across the network to find valuable targets.

Privilege escalation involves gaining higher access rights to expand control within the compromised environment.

Communication with covert channels is a tactic used during persistence or exfiltration, while deletion of critical data is not a standard APT lifecycle stage -- it's more characteristic of destructive attacks.



A high-profile company executive receives an urgent email containing a malicious link. The sender appears to be from the IT department of the company, and the email requests an update of the executive's login credentials for a system update.

Which type of phishing attack does this represent?

  1. Whaling
  2. Vishing
  3. Pharming
  4. Angler phishing

Answer(s): A

Explanation:

Whaling is a targeted phishing attack aimed at high-profile individuals, such as executives. The attacker impersonates a trusted entity (e.g., IT department) to trick the executive into revealing sensitive credentials. This is a form of spear phishing specifically focused on "big fish" targets.



Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?

  1. Virtual
  2. Container
  3. Physical
  4. SASE

Answer(s): B

Explanation:

A container-based NGFW is specifically designed to integrate with Kubernetes environments, providing full application visibility and control within containerized workloads. It operates at the pod level, making it ideal for securing dynamic microservices architectures.



Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?

  1. Cloud
  2. Physical
  3. Virtual
  4. Containerized

Answer(s): B

Explanation:

A physical firewall is ideal for environments like a company headquarters that require redundant power, high throughput, and dedicated hardware for maximum reliability and performance. It supports more robust failover and scalability compared to virtual or containerized options.



Which statement describes the process of application allow listing?

  1. It allows only trusted files, applications, and processes to run.
  2. It creates a set of specific applications that do not run on the system.
  3. It encrypts application data to protect the system from external threats.
  4. It allows safe use of applications by scanning files for malware.

Answer(s): A

Explanation:

Application allow listing is a security practice that permits only pre-approved (trusted) applications, files, and processes to run on a system. This approach helps prevent unauthorized or malicious software from executing, thereby reducing the attack surface.



Viewing page 4 of 46
Viewing questions 16 - 20 out of 225 questions



Post your Comments and Discuss Palo Alto Networks Cybersecurity-Practitioner exam prep with other Community members:

Cybersecurity-Practitioner Exam Discussions & Posts