Certbus > Palo Alto Networks > Palo Alto Networks Certifications > PCCSA > PCCSA Online Practice Questions and Answers

PCCSA Online Practice Questions and Answers

Questions 4

DRAG DROP

Match the common TCP/IP protocol with its corresponding port(s).

Select and Place:

Browse 79 Q&As
Questions 5

DRAG DROP

Match the task for server settings in group mapping with its order in the process.

Select and Place:

Browse 79 Q&As
Questions 6

Which Palo Alto Networks product or feature includes machine learning to enhance security?

A. Panorama

B. MineMeld

C. Magnifier

D. User-ID

Browse 79 Q&As
Questions 7

Which type of attack floods a target with ICMP requests?

A. route table poisoning

B. reconnaissance

C. IP spoofing

D. denial-of-service

Browse 79 Q&As
Questions 8

Which type of attack floods a target with TCP SYN requests?

A. route table poisoning

B. reconaissance

C. denial-of-service

D. IP spoofing

Browse 79 Q&As
Questions 9

Which two components are part of a next-generation firewall security policy? (Choose two.)

A. role-based access controls

B. user identification

C. content identification

D. file permissions

Browse 79 Q&As
Questions 10

Which data security compliance standard is used to protect card holder data wherever it is processed, stored, or transmitted?

A. Property Card Industry

B. Payment Card Industry

C. Personal Card Industry

D. Payment Club Industry

Browse 79 Q&As
Questions 11

You discover an infected email attachment that contains software code that attacks a known vulnerability in a popular social networking application. This type of software code belongs to which type of malware category?

A. social engineering

B. virus

C. pharming

D. exploit

Browse 79 Q&As
Questions 12

What is an example of a distance-vector routing protocol?

A. OSPF

B. BGP

C. RIP D. IGRP

Browse 79 Q&As
Questions 13

Which option lists the correct sequence of a TCP three-way handshake?

A. SYN, ACK, SYN

B. SYN, SYN+ACK, ACK

C. SYN, ACK, FIN

D. SYN, SYN+ACK, FIN

Browse 79 Q&As
Questions 14

In the context of a mobile device management solution, what is a function of the "policy enforcement" feature?

A. controls which websites can be accessed when connected to Wi-Fi

B. controls which Wi-Fi networks can be accessed

C. controls which phone numbers can be dialed

D. controls which password/passcode settings are allowed

Browse 79 Q&As
Questions 15

During which step of the cyber-attack lifecycle is a user's web browser redirected to a webpage that automatically downloads malware to the endpoint?

A. delivery

B. weaponization

C. reconnaissance

D. command-and-control

Browse 79 Q&As
Questions 16

Which two remote access methods are secure because they encrypt traffic? (Choose two.)

A. IPsec-AH

B. SSH

C. VPN

D. Telnet

E. rlogin

Browse 79 Q&As
Questions 17

In PKI, which item is issued by a CA?

A. digital certificate

B. SSH key

C. KDC ticket

D. shared key

Browse 79 Q&As
Questions 18

On an endpoint, which method should you use to secure applications against exploits?

A. full-disk encryption

B. strong user passwords

C. software patches

D. endpoint-based firewall

Browse 79 Q&As
Exam Code: PCCSA
Exam Name: Palo Alto Networks Certified Cybersecurity Associate (PCCSA)
Last Update: Mar 17, 2025
Questions: 79 Q&As

PDF

$49.99

VCE

$55.99

PDF + VCE

$65.99