Palo Alto Networks PCCET Exam
Palo Alto Networks Certified Cybersecurity Entry-level Technician (Page 3 )

Updated On: 30-Jan-2026

Which two malware types can replicate themselves? (Choose two.)

  1. Worm
  2. Virus
  3. Ransomware
  4. Trojan horse

Answer(s): A,B



What inspects data that is egressing a network and prevents certain sensitive data ­ based on de ned policies ­ from leaving the network?

  1. Secure sockets Layer (SSL)
  2. Public key infrastructure (PKI)
  3. Internet protocol security (IPsec)
  4. Data loss prevention (DLP)

Answer(s): D



Which technique is used to limit information about lost or stolen mobile devices?

  1. Remote erase/wipe
  2. De-centralized software upgrades
  3. Provide jailbreaking tools
  4. Unrestricted geo-location

Answer(s): A



Which security model relies on the assumption that everything on the internal network can be trusted?

  1. Perimeter-based security model
  2. OSI model
  3. Cloud Computing model
  4. Zero Trust security model

Answer(s): A



What are three capabilities of mobile device management? (Choose three.)

  1. Exploit protection
  2. Advanced data loss prevention
  3. Remote erase/wipe
  4. Container-based endpoint protection
  5. Malware protection

Answer(s): A,C,E



Viewing page 3 of 41
Viewing questions 11 - 15 out of 254 questions



Post your Comments and Discuss Palo Alto Networks PCCET exam prep with other Community members:

Join the PCCET Discussion