Palo Alto Networks Cloud Security Fundamentals Quiz Answers
In this article i am gone to share Coursera Course: Palo Alto Networks Cloud Security Fundamentals Quiz Answers with you..
Enroll Link: Palo Alto Networks Cloud Security Fundamentals
About this Course
In this Cloud Security Fundamentals course you will learn basic principles associated with securing the cloud and SaaS-based applications through Secure Access Service Edge architecture and identify concepts required to recognize and potentially mitigate attacks against traditional and hybrid datacenters as well as mission critical infrastructure. The course also demonstrates how to initially setup and configure containers on a docker bridge network and test the container security through the use of vulnerability scans and reports.
Palo Alto Networks Cloud Security Fundamentals Module 2 Quiz Answers
Question 1)
The benefit of moving toward a cloud computing model is that it improves operational efficiencies and lowers capital expenditures.
- True
- False
Question 2)
Which cloud computing deployment model is used exclusively by a single organization?
- Private
- Community
- Public
- Hybrid
Question 3)
Which cloud computing service model is not defined by NIST?
- Software as a Service (SaaS)
- Infrastructure as a Service (IaaS)
- Desktop as a Service (DaaS)
- Platform as a Service (PaaS)
Question 4)
The cloud computing service model in which a provider’s applications run on a cloud infrastructure and the consumer does not manage or control the underlying infrastructure is known as:
- Infrastructure as a Service (IAAS)
- Software as a Service (SAAS)
- Platform as a Service (PAAS)
- Identity as a Service (IDAAS)
Question 5)
Which cloud deployment model is bound by standardized or proprietary technology that enables data and application portability (for example, fail over to a secondary data center for disaster recovery or content delivery networks across multiple clouds)?
- Public
- Community
- Private
- Hybrid
Question 6)
Platform as a Service – PaaS – is best described as:
- An online space where customers can develop, run, and manage applications without the complexity of building and maintaining the infrastructure typically associated with developing and launching an app.
- An underlying network infrastructure that virtualizes physical computing resources, data partitioning, scaling, security, backup.
- A licensing and delivery model in which software is licensed on a subscription basis and is centrally hosted.
Palo Alto Networks Cloud Security Fundamentals Module 3 Quiz Answers
Question 1)
Which platform provides all three cloud native characteristics by default and, while assembled from many more generic components, are highly optimized for container workloads.
- Serverless
- Container as a Service
- Thin VMs
- On-Demand Containers
Question 2)
Which cloud native technology balances separation, excellent compatibility with existing apps, and a high degree of operational control with good density potential and easy integration into software development flows.
- Thin VMs
- Serverless
- Containers
- CaaS
Question 3)
In which cloud native technology do applications rely on managed services that abstract away the need to manage, patch, and secure infrastructure and virtual machines.
- Serverless
- Thin VMs
- Containers
- CaaS
Question 4)
Which consideration is not associated with secure virtualization?
- Dormant VMs
- Hypervisor Sprawl
- Hypervisor Vulnerabilities
- Intra-VM Communication
Question 5)
A hypervisor allows multiple, virtual (“guest”:operating systems to run concurrently on a single physical host computer.
- True
- False
Question 6)
In the serverless model, applications rely on managed services that abstract away the need to manage, patch, and secure infrastructure and virtual machines.
- True
- False
Palo Alto Networks Cloud Security Fundamentals Module 4 Quiz Answers
Question 1)
Which of the 4 Cs of cloud native security provides the trusted computing base for a Kubernetes cluster. If the cluster is built on a foundation that is inherently vulnerable or configured with poor security controls, then the other layers cannot be properly secured.
- Clusters
- Containers
- Code
- Cloud
Question 2)
DevSecOps, Development and Operations, teams meet regularly, share analytics, and co-own projects from beginning to end.
- True
- False
Question 3)
The Cloud Native Computing Foundation (CNCF) Kubernetes project defines a container security model for Kubernetes in the context of cloud native security. This model is referred to as “the 4 C’s of Cloud Native security”.
- True
- False
Question 4)
The CI/CD pipeline integrates Development and Operations teams to improve productivity by automating infrastructure and workflows as well as continuously measuring application performance.
- True
- False
Question 5)
Ensuring your cloud resources and SaaS applications are correctly configured and adhere to your organization’s security standards from day one is essential to prevent successful attacks.
- True
- False
Question 6)
The term “cloud native” refers to an approach to building and running applications that takes full advantage of a cloud computing delivery model instead of an on-premises data center.
- True
- False
Palo Alto Networks Cloud Security Fundamentals Module 5 Quiz Answers
Question 1)
Which of the following is not a phase of implementing security in virtualized data centers:
- Consolidating servers across trust levels
- Consolidating servers within trust levels
- Selective network security virtualization
- Implementing a static and flat computing fabric
Question 2)
Data that moves in and out of the virtualized environment from the host network or a corresponding traditional data center is also known as:
- North-South
- Unknown
- North-East
- East-West
Question 3)
Intra-VM traffic is also known as:
- North-South
- Unknown
- North-East
- East-West
Question 4)
The first phase of implementing security in virtualized data centers consists of:
- Consolidating servers across trust levels
- Consolidating servers within trust levels
- Selectively virtualizing network security functions
- Implementing a dynamic computing fabric
Question 5)
An added benefit of using virtual firewalls for east-west protection is the unprecedented traffic and threat visibility that the virtualized security device can now provide.
- True
- False
Palo Alto Networks Cloud Security Fundamentals Module 6 Quiz Answers
Question 1)
Which security-as-a-service layer in Prisma Access SASE capability provides visibility into SaaS application usage, understands where their sensitive data resides, enforces company policies for user access, and protects their data from hackers.
- Threat Prevention
- Data Loss Prevention – DLP
- Cloud Access Security Broker – CASB
- Secure Web Gateway – SWG
Question 2)
Select the Prisma Cloud capability that decouples workload identity from IP addresses, leverages tags and metadata to assign a logical identity to applications and workloads, and then uses it to enforce ID-based micro-segmentation and security policies that adapt to your dynamic environments.
- Identity and access management – IAM – security
- UEBA
- Access management
- Machine identity
Question 3)
Which Prisma Access SASE capability can be used to block inappropriate content – such as pornography and gambling – or websites that businesses simply don’t want users accessing while at work, such as streaming services like Netflix.
- Virtual Private Network – VPN
- Secure Web Gateway – SWG
- Software as a Service – SaaS
- Zero Trust Network Access – ZTNA
Question 4)
To safely enable SaaS usage in your organization, start by clearly defining the SaaS applications that should be used and which behaviors within those applications are allowed. Which category of applications are not allowed by default, but still can be controlled with granular policies?
- Tolerated
- Unsanctioned
- Sanctioned
- Permitted
Question 5)
Select the type of cybersecurity solution or feature that discovers threats by identifying activity that deviates from a baseline.
- Software configuration management – SCM
- User and entity behavior analytics – UEBA
- Integrated development environment – IDE
- Dynamic User List – DUL
Question 6)
Prisma SaaS is an inline service, so it doesn’t impact latency, bandwidth, or end-user experience.
- True
- False
Question 7)
Sanctioned SaaS applications fulfill a legitimate business need, but certain usage restrictions may be necessary to reduce risk.
- True
- False
Question 8)
A cloud access security broker – CASB – is software that monitors activity and enforces security policies on traffic between an organization’s users and cloud-based applications and services.
- True
- False
Also visit: Palo Alto Networks Cloud Security Fundamentals Final Exam Quiz Answers