Palo Alto Networks
Cybersecurity-Practitioner
Q1:
Which pillar of Prisma Cloud application security does vulnerability management fall under?
○
A
dynamic computing○
B
identity security○
C
compute security○
D
network protection
Palo Alto Networks
Cybersecurity-Practitioner
Q2:
What differentiates Docker from a bare metal hypervisor?
○
A
Docker lets the user boot up one or more instances of an operating system on the same host whereas hypervisors do not○
B
Docker uses more resources than a bare metal hypervisor○
C
Docker is more efficient at allocating resources for legacy systems○
D
Docker uses OS-level virtualization, whereas a bare metal hypervisor runs independently from the OS
Palo Alto Networks
Cybersecurity-Practitioner
Q3:
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?
○
A
Use of non-standard ports○
B
Hiding within SSL encryption○
C
Port hopping○
D
Tunneling within commonly used services
Palo Alto Networks
Cybersecurity-Practitioner
Q4:
What is used to orchestrate, coordinate, and control clusters of containers?
○
A
Kubernetes○
B
Prisma Saas○
C
Docker○
D
CN-Series
Palo Alto Networks
Cybersecurity-Practitioner
Q5:
TCP is the protocol of which layer of the OSI model?
○
A
Transport○
B
Session○
C
Data Link○
D
Application