Free PCCET Exam Braindumps (page: 13)

Page 12 of 51

In addition to local analysis, what can send unknown les to WildFire for discovery and deeper analysis to rapidly detect potentially unknown malware?

  1. Cortex XDR
  2. AutoFocus
  3. MineMild
  4. Cortex XSOAR

Answer(s): A



On an endpoint, which method is used to protect proprietary data stored on a laptop that has been stolen?

  1. operating system patches
  2. full-disk encryption
  3. periodic data backups
  4. endpoint-based rewall

Answer(s): B



Why have software developers widely embraced the use of containers?

  1. Containers require separate development and production environments to promote authentic code.
  2. Containers share application dependencies with other containers and with their host computer.
  3. Containers simplify the building and deploying of cloud native applications.
  4. Containers are host speci c and are not portable across different virtual machine hosts.

Answer(s): C



When signature-based antivirus software detects malware, what three things does it do to provide protection? (Choose three.)

  1. decrypt the infected le using base64
  2. alert system administrators
  3. quarantine the infected le
  4. delete the infected le
  5. remove the infected le's extension

Answer(s): C,D,E






Post your Comments and Discuss Palo Alto Networks PCCET exam with other Community members:

PCCET Discussions & Posts