PCCSA Practice Questions
63 real PCCSA exam questions with expert-verified answers and explanations. Page 1 of 2.
- Question #1Network Security Fundamentals
A security policy allows employees to access the Internet. While searching for office supplies on the Internet, a corporate user mistypes a URL, connects to a malicious website, an...
Content FilteringPerimeter SecurityMalware PreventionFirewall - Question #2Network Security Fundamentals
What method can be used to guarantee that a document originates from you and no one else?
Digital SignaturesAsymmetric CryptographyNon-repudiationPrivate Key - Question #3Fundamentals of Cloud Security
Which type of cloud computing deployment makes resources exclusively available to members of a single organization?
Cloud computingCloud deployment modelsPrivate cloud - Question #4Cyberthreat, Cyberattack, and Cybersecurity Awareness
Match the Palo Alto Networks Wild Fire analysis verdict with its definition.
WildFireThreat analysisMalware classificationSecurity verdicts - Question #5Fundamentals of Cloud Security
Match each cloud computing characteristic with its description.
Cloud computing characteristicsNIST cloud modelCloud fundamentals - Question #6Network Security Fundamentals
Match the common TCP/IP protocol with its corresponding port(s).
TCP/IP ProtocolsPort NumbersNetwork FundamentalsCommon Protocols - Question #7Fundamentals of Cloud Security
Match the server setting type with whether it requires the installation of an OS.
Server typesOperating systemsVirtualizationCloud compute models - Question #8Cybersecurity Landscape
Match the tool to its capability.
Security ToolsTool CapabilitiesCybersecurity TechnologiesDefense Mechanisms - Question #9Cyberthreat, Cyberattack, and Cybersecurity Awareness
Match each type of breach to its consequence.
Breach typesBreach consequencesSecurity incidents - Question #10Endpoint Security Fundamentals
In the context of a mobile device management solution, what is a function of the "policy enforcement" feature?
MDMPolicy EnforcementDevice SecurityPasscode Policy - Question #11Cyberthreat, Cyberattack, and Cybersecurity Awareness
Review the exhibit and identify the type of vulnerability or attack.
Spear-phishingSocial engineeringCyberattack typesEmail security - Question #12Cyberthreat, Cyberattack, and Cybersecurity Awareness
Which of the reconnaissance tools might an attacker use to scan for vulnerable network services and settings? (Choose two.)
ReconnaissanceAttacker toolsVulnerability scanningPort scanning - Question #13Cyberthreat, Cyberattack, and Cybersecurity Awareness
During which step of the cyber-attack lifecycle is a user's web browser redirected to a webpage that automatically downloads malware to the endpoint?
Cyber-attack lifecycleMalware deliveryAttack stagesEndpoint compromise - Question #14Cyberthreat, Cyberattack, and Cybersecurity Awareness
How does a machine learning enhance WildFire operation?
WildFireMachine LearningDynamic AnalysisMalware Analysis - Question #15Network Security Fundamentals
Palo Alto Networks App-ID uses information from which source to help identify an application in network traffic?
App-IDApplication Layer FirewallTraffic Behavioral AnalysisNetwork Security - Question #16Network Security Fundamentals
Which capability is required for a next-generation firewall to protect your network against malware threats?
Next-Generation Firewall (NGFW)Malware ProtectionSSL DecryptionNetwork Security - Question #17Endpoint Security Fundamentals
Which Palo Alto Networks technology safely enables business use of mobile devices by providing a unique solution to manage the device, protect the device, and control the data?
Mobile SecurityEndpoint ProtectionGlobalProtectRemote Access - Question #18Network Security Fundamentals
Which option best describes a characteristic of a next-generation firewall but not a UTM device?
NGFWUTMSecurity ArchitectureContent Inspection - Question #19Fundamentals of Cloud Security
Which type of cloud computing service provides access to email and word processing applications running in a cloud infrastructure?
Cloud computingCloud service modelsSaaSCloud applications - Question #20Fundamentals of Cloud Security
What is a result of deploying virtualization in your data center?
VirtualizationData CenterOperational CostsCloud Infrastructure - Question #21Network Security Fundamentals
Which two remote access methods are secure because they encrypt traffic? (Choose two.)
Remote AccessEncryptionNetwork ProtocolsSecurity Protocols - Question #22Cyberthreat, Cyberattack, and Cybersecurity Awareness
Which action must be taken prior to a successful ransomware attack to enable recovery from the attack?
Ransomware recoveryData backupDisaster recovery planning - Question #23Network Security Fundamentals
Which network security architecture feature is designed to purposely expose some of an organization's services to untrusted networks?
DMZNetwork architecturePerimeter securityNetwork segmentation - Question #24Fundamentals of Cloud Security
Which type of cloud computing deployment is available to any person or organization who can pay the usage fees?
Cloud computingCloud deployment modelsPublic cloudCloud services - Question #25Network Security Fundamentals
What is an effective defense against a denial-of-service attack?
DoS AttacksDDoS DefenseIncident ResponseNetwork Isolation - Question #26Network Security Fundamentals
Which component of a digital certificate provides authentication of the certificate's issuer?
Digital CertificatesPKIDigital SignatureAuthentication - Question #27Cybersecurity Landscape
In PKI, which item is issued by a CA?
PKICertificate AuthorityDigital Certificates - Question #28Cyberthreat, Cyberattack, and Cybersecurity Awareness
Which type of adversary would execute a website defacement attack to promote a political agenda?
Adversary typesHacktivismWebsite defacementCyberattack motivations - Question #29Endpoint Security Fundamentals
On an endpoint, which method should you use to secure applications against exploits?
Endpoint SecurityApplication SecurityExploit PreventionEndpoint Firewall - Question #30Endpoint Security Fundamentals
Palo Alto Networks Traps is natively integrated with which Palo Alto Networks offering to protect against unknown exploits and malware threats?
Endpoint ProtectionThreat IntelligenceMalware PreventionPalo Alto Networks Products - Question #31Network Security Fundamentals
Which security component can detect command-and-control traffic sent from multiple endpoints within a corporate data center?
Next-Generation FirewallCommand and ControlNetwork SecurityThreat Detection - Question #32Fundamentals of Cloud Security
Assume that it is your responsibility to secure the software functioning at top five layers in the exhibit.
Cloud SecurityShared Responsibility ModelIaaSCloud Service Models - Question #33Fundamentals of Cloud Security
Which type of SaaS application is allowed and provided by an IT department?
SaaS applicationsCloud application typesIT sanctioned applications - Question #34Network Security Fundamentals
Match the OSI network model Layer 3 function to the correct description.
OSI modelNetwork LayerLayer 3 functions - Question #35Cyberthreat, Cyberattack, and Cybersecurity Awareness
Match the attack definition to the type of security method used to protect against the attack.
CyberattacksSecurity MethodsThreat Protection - Question #36Cyberthreat, Cyberattack, and Cybersecurity Awareness
Which type of attack floods a target with ICMP requests?
Denial of ServiceICMP floodNetwork attacksCyberattacks - Question #37Cyberthreat, Cyberattack, and Cybersecurity Awareness
Which type of attack floods a target with TCP SYN requests?
Denial-of-ServiceSYN floodNetwork attacks - Question #38Network Security Fundamentals
What type of technology is currently considered the preferred method for securely connecting a remote endpoint device back to an enterprise network?
VPNRemote Access VPNSSL VPNNetwork Protocols - Question #39Cyberthreat, Cyberattack, and Cybersecurity Awareness
What technique is not used to break the command-and-control (C&C) phase of the Cyber-Attack Lifecycle?
Cyber-Attack LifecycleCommand and ControlNetwork Security ControlsVulnerability Management - Question #40Cybersecurity Landscape
Which data security compliance standard is used to protect card holder data wherever it is processed, stored, or transmitted?
compliance standarddata securityPCI DSScardholder data - Question #41Endpoint Security Fundamentals
What does Palo Alto Networks Traps do first when an endpoint is asked to run an executable?
Endpoint SecurityPalo Alto Networks TrapsThreat PreventionExecution Policies - Question #42Network Security Fundamentals
What is the function of a hashing protocol?
HashingData IntegrityCryptographic Hashing - Question #43Network Security Fundamentals
Which systems operate at the network layer in the OSI network model? (Choose two.)
OSI modelNetwork layerIP addressingNetwork devices - Question #44Fundamentals of Cloud Security
In which type of cloud computing service does an organization own and control application data, but not the application?
Cloud computingSaaSCloud service modelsData ownership - Question #45Cyberthreat, Cyberattack, and Cybersecurity Awareness
You discover an infected email attachment that contains software code that attacks a known vulnerability in a popular social networking application. This type of software is an exa...
Malware categoriesExploitsVulnerabilitiesAttack vectors - Question #46Network Security Fundamentals
What is an example of a distance-vector routing protocol?
Routing protocolsDistance-vector routingRIPNetwork fundamentals - Question #47Network Security Fundamentals
The OSI model consists of how many layers?
OSI modelNetwork layersNetworking fundamentals - Question #48Network Security Fundamentals
What are the characteristics of application firewalls? (Choose three.)
Application FirewallProxy FirewallNetwork Security - Question #49Network Security Fundamentals
Which two components are part of a next-generation firewall security policy? (Choose two.)
Next-Generation FirewallSecurity PolicyUser IdentificationContent Identification - Question #50Cyberthreat, Cyberattack, and Cybersecurity Awareness
Which type of malware is self-replicating but must first infect a host program and be executed by a user or process?
MalwareWormCyberthreatsMalware Classification