The Palo Alto Networks Certified Cybersecurity Associate (PCCSA) certification verifies an applicant’s current knowledge of cyber-threats and cyber-security, as well as the skills needed for entry-level network security jobs, whose technical requirements change as quickly as the technology on which they are built. A certified PCCSA specialist can vouch for his or her knowledge of advanced technologies and how to deal with cyber threats of the future.

Question 1
Which type of cloud computing service provides access to email and word processing applications running in a cloud infrastructure?
A. software as a service
B. computing as a service
C. platform as a service
D. infrastructure as a service

Answer : A

 

Question 2
What is the result of deploying virtualization in your data center?
A. reduced security threat
B. reduced operational costs
C. increased hardware capital costs
D. increased host provisioning

Answer : B

 

Question 3
Which two remote access methods are secure because they encrypt traffic? (Choose two.)
A. IPsec-AH
B. SSH
C. VPN
D. Telnet
E. rlogin

Answer : BC

 

Question 4
Which action must be taken prior to a successful ransomware attack to enable recovery from the attack?
A. create a data snapshot on your IDS device
B. back up all hosts that contain critical data
C. update all firewall malware signatures
D. limit external exposure of internal DNS resource records

Answer : B

 

Question 5
Which network security architecture feature is designed to purposely expose some of an organization”™s services to untrusted networks?
A. network zone
B. security zone
C. demilitarized zone
D. military zone

Answer : C

Question 6
Which type of cloud computing deployment is available to any person or organization who can pay the usage fees?
A. public
B. hybrid
C. private
D. local

Answer : A

 

Question 7
Which type of adversary would execute a website defacement attack to promote a political agenda?
A. script kiddie
B. hacktivist
C. gray hat hacker
D. state sponsored hacker

Answer : B

 

Question 8
What is an effective defense against a denial-of-service attack?
A. deploy a firewall to reject suspect network packets
B. flood the DoS source with ICMP echo requests to reduce attack output
C. contact the upstream ISP and disconnect affected network interfaces
D. configure additional network interfaces for legitimate network traffic

Answer : C

 

Question 9
Which component of a digital certificate provides authentication of the certificate”™s issuer?
A. digital signature
B. certificate revocation list
C. issuer”™s private key
D. certificate”™s expiration date

Answer : A

 

Question 10
In PKI, which item is issued by a CA?
A. digital certificate
B. SSH key
C. KDC ticket
D. shared key

Answer : A

 

 

Last modified: 2021-11-04

Author

Comments

Write a Reply or Comment

Your email address will not be published.