PCCET Palo Alto Networks Certified Cybersecurity Entry-level Technician Questions and Answers
Which two pieces of information are considered personally identifiable information (PII)? (Choose two.)
Which analysis detonates previously unknown submissions in a custom-built, evasion-resistant virtual environment to determine real-world effects and behavior?
Which activities do local organization security policies cover for a SaaS application?
Which pillar of Prisma Cloud application security addresses ensuring that your cloud resources and SaaS applications are correctly configured?
In which two cloud computing service models are the vendors responsible for vulnerability and patch management of the underlying operating system? (Choose two.)
Which two network resources does a directory service database contain? (Choose two.)
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
How does DevSecOps improve the Continuous Integration/Continuous Deployment (CI/CD) pipeline?
What does Palo Alto Networks Cortex XDR do first when an endpoint is asked to run an executable?
Which SOAR feature coordinates across technologies, security teams, and external users for centralized data visibility and action?
On an endpoint, which method should you use to secure applications against exploits?
Which attacker profile acts independently or as part of an unlawful organization?
Identify a weakness of a perimeter-based network security strategy to protect an organization ' s endpoint systems.
Which feature of the VM-Series firewalls allows them to fully integrate into the DevOps workflows and CI/CD pipelines without slowing the pace of business?
What is the primary security focus after consolidating data center hypervisor hosts within trust levels?
Systems that allow for accelerated incident response through the execution of standardized and automated playbooks that work upon inputs from security technology and other data flows are known as what?
Which pillar of Prisma Cloud application security does vulnerability management fall under?
Given the graphic, match each stage of the cyber-attack lifecycle to its description.


Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB) fall under which Prisma access service layer?
Which type of malware takes advantage of a vulnerability on an endpoint or server?
With regard to cloud-native security in layers, what is the correct order of the four C ' s from the top (surface) layer to the bottom (base) layer?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?







