Month End Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

PCCP Questions and Answers

Question # 6

Which two processes are critical to a security information and event management (SIEM) platform? (Choose two.)

A.

Detection of threats using data analysis

B.

Automation of security deployments

C.

Ingestion of log data

D.

Prevention of cvbersecurity attacks

Full Access
Question # 7

What differentiates SOAR from SIEM?

A.

SOAR platforms focus on analyzing network traffic.

B.

SOAR platforms integrate automated response into the investigation process.

C.

SOAR platforms collect data and send alerts.

D.

SOAR platforms filter alerts with their broader coverage of security incidents.

Full Access
Question # 8

Which technology grants enhanced visibility and threat prevention locally on a device?

A.

EDR

B.

IDS

C.

SIEM

D.

DLP

Full Access
Question # 9

Which two services does a managed detection and response (MDR) solution provide? (Choose two.)

A.

Improved application development

B.

Incident impact analysis

C.

Periodic firewall updates

D.

Proactive threat hunting

Full Access
Question # 10

Which MITRE ATT&CK tactic grants increased permissions to a user account for internal servers of a corporate network?

A.

Impact

B.

Privilege escalation

C.

Data exfiltration

D.

Persistence

Full Access
Question # 11

Which type of attack includes exfiltration of data as a primary objective?

A.

Advanced persistent threat

B.

Denial-of-service (DoS)

C.

Watering hole attack

D.

Cross-Site Scripting (XSS)

Full Access
Question # 12

Which next-generation firewall (NGFW) deployment option provides full application visibility into Kubernetes environments?

A.

Virtual

B.

Container

C.

Physical

D.

SASE

Full Access
Question # 13

Which component of the AAA framework regulates user access and permissions to resources?

A.

Authorization

B.

Allowance

C.

Accounting

D.

Authentication

Full Access
Question # 14

Which action is unique to the security orchestration, automation, and response (SOAR) platforms?

A.

Prioritizing alerts

B.

Enhancing data collection

C.

Usingpredefined workflows

D.

Correlating incident data

Full Access
Question # 15

What is required for an effective Attack Surface Management (ASM) process?

A.

Real-time data rich inventory

B.

Static inventory of assets

C.

Periodic manual monitoring

D.

Isolation of assets by default

Full Access
Question # 16

Which type of firewall should be implemented when a company headquarters is required to have redundant power and high processing power?

A.

Cloud

B.

Physical

C.

Virtual

D.

Containerized

Full Access
Question # 17

Which technology helps Security Operations Center (SOC) teams identify heap spray attacks on company-owned laptops?

A.

CSPM

B.

ASM

C.

EDR

D.

CVVP

Full Access
Question # 18

What is an operation of an Attack Surface Management (ASM) platform?

A.

It scans assets in the cloud space for remediation of compromised sanctioned SaaS applications.

B.

It continuously identifies all internal and external internet-connected assets for potential attack vectors and exposures.

C.

It identifies and monitors the movement of data within, into, and out of an organization's network.

D.

It detects and remediates misconfigured security settings in sanctioned SaaS applications through monitoring.

Full Access
Question # 19

Which technology secures software-as-a-service (SaaS) applications and network data, and also enforces compliance policies for application access?

A.

DLP

B.

CASB

C.

DNS Security

D.

URL filtering

Full Access
Question # 20

Which type of attack involves sending data packets disguised as queries to a remote server, which then sends the data back to the attacker?

A.

DDoS

B.

DNS tunneling

C.

Command-and-control (C2)

D.

Port evasion

Full Access
Question # 21

Which type of portable architecture can package software with dependencies in an isolated unit?

A.

Containerized

B.

Serverless

C.

Air-gapped

D.

SaaS

Full Access