PCCET Exam Questions With Correct
Answers
Business intelligence (BI) software consists of tools and techniques used to surface large
amounts of raw unstructured data to perform a variety of tasks, including data mining, event
processing, and predictive analytics. - answerTrue
The process in wh...
BRIGHTSTARS EXAM STUDY SOLUTIONS 8/15/2024 2:05 PM
PCCET Exam Questions With Correct
Answers
Business intelligence (BI) software consists of tools and techniques used to surface large
amounts of raw unstructured data to perform a variety of tasks, including data mining, event
processing, and predictive analytics. - answer✔✔True
The process in which end users find personal technology and apps that are more powerful or
capable, more convenient, less expensive, quicker to install, and easier to use than enterprise IT
solutions is known as consumerization. - answer✔✔True
Which action is associated with Web 1.0? - answer✔✔checking CNN's website for news
Which action is associated with Web 3.0? - answer✔✔asking Apple's Siri a question
Gmail is associated with which cloud computing model? - answer✔✔SaaS
Which two port numbers are associated with HTTP? (Choose two.) - answer✔✔80
8080
Which port number is associated with HTTPS? - answer✔✔443
Which port is used for encrypted communication? - answer✔✔22
Which protocol distinguishes between applications using port numbers? - answer✔✔TCP
How do attackers prevent port scans from being noticed by monitoring software? -
answer✔✔scan ports so quickly it is finished before it can be detected and stopped
Which potentially risky attributes is the most serious? - answer✔✔malware
Which application can be used as a tunnel for other applications? - answer✔✔SSH
Which two devices or systems require the configuration of non-standard ports to be able to use
an application on a non-standard port? (Choose two.) - answer✔✔client
Sever
, BRIGHTSTARS EXAM STUDY SOLUTIONS 8/15/2024 2:05 PM
If you are responsible for the application's security but not the operating system's security, which
cloud computing service model are you using? - answer✔✔PaaS
Which specific technology is associated with Web 3.0? - answer✔✔blockchain
Which type of advanced malware has entire sections of code that serve no purpose other than to
change the signature of the malware, thus producing an infinite number of signature hashes for
even the smallest of malware programs? - answer✔✔polymorphism
Which type of cyberattack sends extremely high volumes of network traffic such as packets,
data, or transactions that render the victim's network unavailable or unusable? -
answer✔✔distributed denial-of-service (DDoS)
Which core component of Cortex combines security orchestration, incident management, and
interactive investigation to serve security teams across the incident lifecycle? - answer✔✔Cortex
XSOAR
Which Wi-Fi attack leverages device information about which wireless networks it previously
connected to? - answer✔✔Jasager
Which Zero Trust capability provides a combination of anti-malware and intrusion prevention
technologies to protect against both known and unknown threats, including mobile device
threats? - answer✔✔cyberthreat protection
Which malware type is installed in the BIOS of a machine, which means operating system level
tools cannot detect it? - answer✔✔rootkit
Which type of phishing attack is specifically directed at senior executives or other high-profile
targets within an organization? - answer✔✔whaling
Which wireless security protocol includes improved security for IoT devices, smart bulbs,
wireless appliances, and smart speakers? - answer✔✔WPA3
Which tactic, technique, or procedure (TTP) masks application traffic over port 443 (HTTPS)? -
answer✔✔hiding within SSL encryption
Which kind of security always is the responsibility of the cloud customer? - answer✔✔data
Where is your data typically stored in a SaaS application? - answer✔✔in the cloud, in a database
controlled by the SaaS provider
Who is responsible for the security settings in an enterprise SaaS application? - answer✔✔both
IT administrators and users
When is it impossible to secure SaaS data? - answer✔✔when a user uses an unmanaged device
to access an unsanctioned SaaS instance
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Brightstars. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.49. You're not tied to anything after your purchase.