Free Palo Alto Networks Cybersecurity-Practitioner Exam Questions (page: 9)

Which feature is part of an intrusion prevention system (IPS)?

  1. API-based coverage of apps
  2. Automated security actions
  3. Protection of data at rest
  4. Real-time web filtering

Answer(s): B

Explanation:

An Intrusion Prevention System (IPS) includes automated security actions, such as blocking malicious traffic, resetting connections, or alerting administrators when it detects suspicious activity, helping to stop attacks in real time.



What are two capabilities of identity threat detection and response (ITDR)? (Choose two.)

  1. Securing individual devices
  2. Matching risks to signatures
  3. Scanning for excessive logins
  4. Analyzing access management logs

Answer(s): C,D

Explanation:

Scanning for excessive logins ­ ITDR identifies suspicious patterns such as unusual or excessive login attempts, which may indicate credential abuse.

Analyzing access management logs ­ ITDR tools analyze identity-related logs, including authentication and authorization events, to detect threats tied to user behavior and access anomalies.

Device security and signature matching are not core functions of ITDR; they fall under endpoint protection and traditional threat detection respectively.



Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?

  1. DDoS
  2. DNS tunneling
  3. Command-and-control (C2)
  4. Port evasion

Answer(s): B

Explanation:

DNS tunneling is an attack technique where data packets are disguised as DNS queries and sent to a remote server. That server, often under the attacker's control, responds with additional data or instructions, effectively creating a covert command-and-control (C2) channel over DNS.



Which service is encompassed by serverless architecture?

  1. Infrastructure as a Service (laaS)
  2. Function as a Service (FaaS)
  3. Security as a Service (SaaS)
  4. Authentication as a Service

Answer(s): B

Explanation:

Serverless architecture is primarily implemented through Function as a Service (FaaS), where developers write and deploy individual functions without managing the underlying infrastructure. The cloud provider handles scaling, resource allocation, and execution on demand.



Which architecture model uses virtual machines (VMs) in a public cloud environment?

  1. Kubernetes
  2. Serverless
  3. Docker
  4. Host-based

Answer(s): D

Explanation:

A host-based architecture uses virtual machines (VMs) to run workloads on a shared host, commonly found in public cloud environments. Each VM operates independently with its own OS, making this model suitable for traditional and isolated application deployments.



Viewing page 9 of 46
Viewing questions 41 - 45 out of 225 questions



Post your Comments and Discuss Palo Alto Networks Cybersecurity-Practitioner exam prep with other Community members:

Cybersecurity-Practitioner Exam Discussions & Posts