This page was exported from Braindump2go Free Exam Dumps with PDF and VCE Collection [ https://www.mcitpdump.com ] Export date:Tue Dec 3 17:14:29 2024 / +0000 GMT ___________________________________________________ Title: [September-2022]Free PCCET PDF and VCE Dumps Offered for Download[Q76-Q93] --------------------------------------------------- September/2022 Latest Brainbdump2go PCCET Exam Dumps with PDF and VCE Free Updated Today! Following are some new Braindump2go PCCET Real Exam Questions!QUESTION 76Which network device breaks networks into separate broadcast domains?A. HubB. Layer 2 switchC. RouterD. Wireless access pointAnswer: CExplanation:A layer 2 switch will break up collision domains but not broadcast domains. To break up broadcast domains you need a Layer 3 switch with vlan capabilities.QUESTION 77Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?A. Knowledge-basedB. Signature-basedC. Behavior-basedD. Database-basedAnswer: CExplanation:IDSs and IPSs also can be classified as knowledge-based (or signature-based) or behavior-based (or statistical anomaly-based) systems:A knowledge-based system uses a database of known vulnerabilities and attack profiles to identify intrusion attempts. These types of systems have lower false-alarm rates than behavior-based systems but must be continually updated with new attack signatures to be effective.A behavior-based system uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt. These types of systems are more adaptive than knowledge-based systems and therefore may be more effective in detecting previously unknown vulnerabilities and attacks, but they have a much higher false-positive rate than knowledge-based systemsQUESTION 78Which NGFW feature is used to provide continuous identification, categorization, and control of known and previously unknown SaaS applications?A. User-IDB. Device-IDC. App-IDD. Content-IDAnswer: CExplanation:App-IDTM technology leverages the power of the broad global community to provide continuous identification, categorization, and granular risk-based control of known and previously unknown SaaS applications, ensuring new applications are discovered automatically as they become popular.QUESTION 79In an IDS/IPS, which type of alarm occurs when legitimate traffic is improperly identified as malicious traffic?A. False-positiveB. True-negativeC. False-negativeD. True-positiveAnswer: AExplanation:In anti-malware, a false positive incorrectly identifies a legitimate file or application as malware. A false negative incorrectly identifies malware as a legitimate file or application. In intrusion detection, a false positive incorrectly identifies legitimate traffic as a threat, and a false negative incorrectly identifies a threat as legitimate traffic.QUESTION 80What does SOAR technology use to automate and coordinate workflows?A. algorithmsB. Cloud Access Security BrokerC. Security Incident and Event ManagementD. playbooksAnswer: DExplanation:SOAR tools ingest aggregated alerts from detection sources (such as SIEMs, network security tools, and mailboxes) before executing automatable, process-driven playbooks to enrich and respond to these alerts.QUESTION 81In a traditional data center what is one result of sequential traffic analysis?A. simplifies security policy managementB. reduces network latencyC. causes security policies to be complexD. improves security policy application ID enforcementAnswer: CExplanation:Multiple policies, no policy reconciliation tools: Sequential traffic analysis (stateful inspection, application control, intrusion prevention system (IPS), anti-malware, etc.) in traditional data center security solutions requires a corresponding security policy or profile, often using multiple management tools. The result is that your security policies become convoluted as you build and manage a firewall policy with source, destination, user, port, and action; an application control policy with similar rules; and any other threat prevention rules required. Multiple security policies that mix positive (firewall) and negative (application control, IPS, and anti-malware) control models can cause security holes by missing traffic and/or not identifying.QUESTION 82Which three services are part of Prisma SaaS? (Choose three.)A. Data Loss PreventionB. DevOpsC. Denial of ServiceD. Data Exposure ControlE. Threat PreventionAnswer: ADEQUESTION 83In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?A. exploitationB. actions on the objectiveC. command and controlD. installationAnswer: CExplanation:Command and Control: Attackers establish encrypted communication channels back to command- and-control (C2) servers across the internet so that they can modify their attack objectives and methods as additional targets of opportunity are identified within the victim network, or to evade any new security countermeasures that the organization may attempt to deploy if attack artifacts are discovered.QUESTION 84Which of the following is an AWS serverless service?A. BetaB. KappaC. DeltaD. LambdaAnswer: DExplanation:Examples of serverless environments include Amazon Lambda and Azure Functions. Many PaaS offerings, such as Pivotal Cloud Foundry, also are effectively serverless even if they have not historically been marketed as such. Although serverless may appear to lack the container-specific, cloud native attribute, containers are extensively used in the underlying implementations, even if those implementations are not exposed to end users directly.QUESTION 85In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?A. the network is largeB. the network is smallC. the network has low bandwidth requirementsD. the network needs backup routesAnswer: AExplanation:A static routing protocol requires that routes be created and updated manually on a router or other network device. If a static route is down, traffic can't be automatically rerouted unless an alternate route has been configured. Also, if the route is congested, traffic can't be automatically rerouted over the less congested alternate route. Static routing is practical only in very small networks or for very limited, special-case routing scenarios (for example, a destination that's used as a backup route or is reachable only via a single router). However, static routing has low bandwidth requirements (routing information isn't broadcast across the network) and some built-in security (users can route only to destinations that are specified in statically defined routes).QUESTION 86Which three layers of the OSI model correspond to the Application Layer (L4) of the TCP/IP model?A. Session, Transport, NetworkB. Application, Presentation, and SessionC. Physical, Data Link, NetworkD. Data Link, Session, TransportAnswer: BExplanation:Application (Layer 4 or L4): This layer loosely corresponds to Layers 5 through 7 of the OSI model. Transport (Layer 3 or L3): This layer corresponds to Layer 4 of the OSI model. Internet (Layer 2 or L2): This layer corresponds to Layer 3 of the OSI model. Network Access (Layer 1 or L1): This layer corresponds to Layers 1 and 2 of the OSI model.QUESTION 87A user is provided access over the internet to an application running on a cloud infrastructure. The servers, databases, and code of that application are hosted and maintained by the vendor.Which NIST cloud service model is this?A. IaaSB. SaaSC. PaaSD. CaaSAnswer: BExplanation:SaaS - User responsible for only the data, vendor responsible for rest.QUESTION 88Which type of malware replicates itself to spread rapidly through a computer network?A. ransomwareB. Trojan horseC. virusD. wormAnswer: DExplanation:A worm replicates through the network while a virus replicates, not necessarily to spread through the network.QUESTION 89From which resource does Palo Alto Networks AutoFocus correlate and gain URL filtering intelligence?A. Unit 52B. PAN-DBC. BrightCloudD. MineMeldAnswer: BExplanation:When you enable URL Filtering, all web traffic is compared against the URL Filtering database, PAN- DB, which contains millions of URLs that have been grouped into about 65 categories.QUESTION 90Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?A. User-IDB. Lightweight Directory Access Protocol (LDAP)C. User and Entity Behavior Analytics (UEBA)D. Identity and Access Management (IAM)Answer: DExplanation:Identity and access management (IAM) is a software service or framework that allows organizations to define user or group identities within software environments, then associate permissions with them. The identities and permissions are usually spelled out in a text file, which is referred to as an IAM policy.QUESTION 91Which pillar of Prisma Cloud application security does vulnerability management fall under?A. dynamic computingB. identity securityC. compute securityD. network protectionAnswer: CExplanation:Prisma Cloud comprises four pillars:Visibility, governance, and compliance. Gain deep visibility into the security posture of multicloud environments. Track everything that gets deployed with an automated asset inventory, and maintain compliance with out-of-the-box governance policies that enforce good behavior across your environments.Compute security. Secure hosts, containers, and serverless workloads throughout the application lifecycle. Detect and prevent risks by integrating vulnerability intelligence into your integrated development environment (IDE), software configuration management (SCM), and CI/CD workflows. Enforce machine learning-based runtime protection to protect applications and workloads in real time.Network protection. Continuously monitor network activity for anomalous behavior, enforce microservice-aware micro-segmentation, and implement industry-leading firewall protection. Protect the network perimeter and the connectivity between containers and hosts.Identity security. Monitor and leverage user and entity behavior analytics (UEBA) across your environments to detect and block malicious actions. Gain visibility into and enforce governance.QUESTION 92What is used to orchestrate, coordinate, and control clusters of containers?A. KubernetesB. Prisma SaasC. DockerD. CN-SeriesAnswer: AExplanation:As containers grew in popularity and used diversified orchestrators such as Kubernetes (and its derivatives, such as OpenShift), Mesos, and Docker Swarm, it became increasingly important to deploy and operate containers at scale.https://www.dynatrace.com/news/blog/kubernetes-vs-docker/QUESTION 93Under which category does an application that is approved by the IT department, such as Office 365, fall?A. unsanctionedB. prohibitedC. toleratedD. sanctionedAnswer: DResources From:1.2022 Latest Braindump2go PCCET Exam Dumps (PDF & VCE) Free Share:https://www.braindump2go.com/pccet.html2.2022 Latest Braindump2go PCCET PDF and PCCET VCE Dumps Free Share:https://drive.google.com/drive/folders/1FHsquxrgknErO-CvKLAoNMB-DXl81lpe?usp=sharing3.2021 Free Braindump2go PCCET Exam Questions Download:https://www.braindump2go.com/free-online-pdf/PCCET-PDF-Dumps(Q76-Q93).pdfFree Resources from Braindump2go,We Devoted to Helping You 100% Pass All Exams! --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2022-09-27 08:41:43 Post date GMT: 2022-09-27 08:41:43 Post modified date: 2022-09-27 08:41:43 Post modified date GMT: 2022-09-27 08:41:43 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com