Free Palo Alto Networks Cybersecurity-Practitioner Exam Questions (page: 7)

What are two characteristics of an advanced persistent threat (APT)? (Choose two.)

  1. Multiple attack vectors
  2. Repeated pursuit of objective
  3. Reduced interaction time
  4. Tendency to isolate hosts

Answer(s): A,B

Explanation:

Multiple attack vectors ­ APTs often use various methods (phishing, malware, lateral movement) to infiltrate and maintain access to a target.

Repeated pursuit of objective ­ APTs are known for their persistent nature, involving continuous efforts over time to achieve their goals, such as data theft or surveillance.



Which product functions as part of a SASE solution?

  1. Cortex
  2. Prisma Cloud
  3. Kubernetes
  4. Prisma SD-WAN

Answer(s): D

Explanation:

Prisma SD-WAN is a key component of a SASE (Secure Access Service Edge) solution. It provides intelligent routing, traffic optimization, and secure connectivity between users and applications, supporting the networking part of SASE alongside security services like those in Prisma Access.



Which statement describes a host-based intrusion prevention system (HIPS)?

  1. It analyzes network traffic to detect unusual traffic flows and new malware.
  2. It scans a Wi-Fi network for unauthorized access and removes unauthorized devices.
  3. It is placed as a sensor to monitor all network traffic and scan for threats.
  4. It is installed on an endpoint and inspects the device.

Answer(s): D

Explanation:

A Host-Based Intrusion Prevention System (HIPS) is installed directly on an endpoint device (such as a server or workstation) and monitors local system activity, including processes, file access, and system calls, to detect and prevent malicious behavior.



Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?

  1. Impact
  2. Privilege escalation
  3. Data exfiltration
  4. Persistence

Answer(s): B

Explanation:

The Privilege Escalation tactic in the MITRE ATT&CK framework involves techniques used by attackers to gain higher-level permissions on a system or network, allowing greater access to internal servers and sensitive data.



Which type of portable architecture can package software with dependencies in an isolated unit?

  1. Containerized
  2. Serverless
  3. Air-gapped
  4. SaaS

Answer(s): A

Explanation:

A containerized architecture packages software along with its dependencies, libraries, and configuration into an isolated unit called a container. This ensures consistent behavior across environments and simplifies deployment and scaling.



Viewing page 7 of 46
Viewing questions 31 - 35 out of 225 questions



Post your Comments and Discuss Palo Alto Networks Cybersecurity-Practitioner exam prep with other Community members:

Cybersecurity-Practitioner Exam Discussions & Posts