Palo Alto Networks Certified Cybersecurity Entry-level Technician Questions and Answers
Question 45
Which option describes the “selective network security virtualization” phase of incrementally transforming data centers?
Options:
A.
during the selective network security virtualization phase, all intra-host communication paths are strictly controlled
B.
during the selective network security virtualization phase, all intra-host traffic is forwarded to a Web proxy server
C.
during the selective network security virtualization phase, all intra-host traffic is encapsulated and encrypted using the IPSEC protocol
D.
during the selective network security virtualization phase, all intra-host traffic is load balanced
Answer:
A
Explanation:
Explanation:
Selective network security virtualization: Intra-host communications and live migrations are architected at this phase. All intra-host communication paths are strictly controlled to ensure that traffic between VMs at different trust levels is intermediated either by an on-box, virtual security appliance or by an off-box, physical security appliance.
Question 46
Which type of LAN technology is being displayed in the diagram?
Options:
A.
Star Topology
B.
Spine Leaf Topology
C.
Mesh Topology
D.
Bus Topology
Answer:
C
Explanation:
Explanation:
The diagram displays a mesh topology, where each device is connected to every other device in the network. This topology is characterized by the multiple connections each node has, ensuring there is no single point of failure and providing redundant paths for data transmission, enhancing the reliability and resilience of the network. Mesh topology is one of the types of LAN technology that uses ethernet or Wi-Fi to connect devices12. References:
What Is Local Area Network (LAN)? Definition, Types, Architecture, and Best Practices from Spiceworks
Types of LAN | Introduction and Classification of LAN from EDUCBA
Question 47
What is the definition of a zero-day threat?
Options:
A.
The amount of time it takes to discover a vulnerability and release a security fix
B.
The period between the discovery of a vulnerability and development and release of a patch
C.
The day a software vendor becomes aware of an exploit and prevents any further hacking
D.
A specific day during which zero threats occurred
Answer:
B
Explanation:
Explanation:
A zero-day threat is an attack that takes advantage of a security vulnerability that does not have a fix in place. It is referred to as a “zero-day” threat because once the flaw is eventually discovered, the developer or organization has “zero days” to then come up with a solution. A zero-day threat can compromise a system or network by exploiting the unknown vulnerability, and can cause data loss, unauthorized access, or other damages. Zero-day threats are difficult to detect and prevent, and require advanced security solutions and practices to mitigate them. References: