Computer Science  >  QUESTIONS & ANSWERS  >  PALO PCCET EXAM WITH COMPLETE SOLUTION (All)

PALO PCCET EXAM WITH COMPLETE SOLUTION

Document Content and Description Below

PALO PCCET EXAM WITH COMPLETE SOLUTION True or False: Business intelligence (BI) software consists of tools and techniques used to surface large amounts of raw unstructured data to perform a variety ... of tasks, including data mining, event processing, and predictive analytics. - answerTrue. True or False: The process in which end users find personal technology and apps that are more powerful or capable, more convenient, less expensive, quicker to install, and easier to use than enterprise IT solutions is known as consumerization. - answerTrue. Which action is associated with Web 1.0? A. checking CNN's website for news B. posting on Facebook C. adding information to Wikipedia D. asking Apple's Siri a question - answerA. checking CNN's website for news Which action is associated with Web 3.0? A. Checking CNN's website for news B. posting on Facebook C. adding information to Wikipedia D. asking Apple's Siri a question - answerD. asking Apple's Siri a question Gmail is associated with which cloud computing model? A. SaaS B. PaaS C. IaaS D. DaaS - answerA. SaaS Which two port numbers are associated with HTTP? (Choose two.) A. 80 B. 389 C. 8080 D. 25 - answerA. 80 C. 8080 Which port number is associated with HTTPS? A. 21 B. 23 C. 443 D. 53 - answerC. 443 Which port is used for encrypted communication? A. 22 B. 80 C. 389 D. 25 - answerA. 22 Which protocol distinguishes between applications using port numbers? A. TCP B. ICMP C. ESP D. UDP - answer How do attackers prevent port scans from being noticed by monitoring software? A. scan ports so quickly it is finished before it can be detected and stopped B. scan ports so slowly it looks like random attempts to connect, rather than a concerted attack C. scan ports from an internal device D. scan ports through WiFi instead of Ethernet - answerA. scan ports so quickly it is finished before it can be detected and stopped Which potentially risky attributes is the most serious? A. pervasive B. malware C. excessive bandwidth D. tunnels - answerB. malware Which application can be used as a tunnel for other applications? A. Telnet B. SMTP C. HTTPS D. SSH - answerD. SSH Which two devices or systems require the configuration of non-standard ports to be able to use an application on a non-standard port? (Choose two.) A. firewall B. client C. server D. operating system E. certificate - answerB. client C. server . If you are responsible for the application's security but not the operating system's security, which cloud computing service model are you using? A. your own data center B. IaaS C. PaaS D. SaaS - answerC. PaaS Which kind of security always is the responsibility of the cloud customer? A. physical B. network C. application D. data - answerD. data Where is your data typically stored in a SaaS application? A. in your data center, in a database under your control B. in your data center, in a database controlled by the SaaS provider C. in the cloud, in a database you control D. in the cloud, in a database controlled by the SaaS provider - answerD. in the cloud, in a database controlled by the SaaS provider Who is responsible for the security settings in an enterprise SaaS application? A. SaaS provider B. IT administrator of the customer organization C. user, typically an employee of the customer organization D. both IT administrators and users - answerD. both IT administrators and users When is it impossible to secure SaaS data? A. when a user uses an unmanaged device to access an unsanctioned SaaS instance B. when a user uses a managed device to access an unsanctioned SaaS instance C. when a user uses an unmanaged device to access a sanctioned SaaS instance D. when a user uses a managed device to access a sanctioned SaaS instance - answerA. when a user uses an unmanaged device to access an unsanctioned SaaS instance True or False? An organization can be compliant with all applicable security and privacy regulations for its industry yet still not be secure. - answerTrue Which three data fields are considered personally identifiable information (PII)? Choose three.) A. unique identification number (such as driver's license number) B. honorific (Mr., Mrs., Dr., etc.) C. telephone number D. blood pressure (when not connected to other fields) E. fingerprints - answerA. unique identification number (such as driver's license number) C. telephone number E. fingerprints [Show More]

Last updated: 3 years ago

Preview 1 out of 53 pages

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)
Preview image of PALO PCCET EXAM WITH COMPLETE SOLUTION document

Buy this document to get the full access instantly

Instant Download Access after purchase

Buy Now

Instant download

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Reviews( 0 )

$9.00

Buy Now

We Accept:

Payment methods accepted on Scholarfriends (We Accept)

Instant download

Can't find what you want? Try our AI powered Search

107
0

Document information


Connected school, study & course


About the document


Uploaded On

Oct 16, 2022

Number of pages

53

Written in

All

Seller


Profile illustration for Prof.Pierro
Prof.Pierro

Member since 4 years

240 Documents Sold

Reviews Received
31
7
3
0
0
Additional information

This document has been written for:

Uploaded

Oct 16, 2022

Downloads

 0

Views

 107

Document Keyword Tags


$9.00
What is Scholarfriends

Scholarfriends.com Online Platform by Browsegrades Inc. 651N South Broad St, Middletown DE. United States.

We are here to help

We're available through e-mail, Twitter, and live chat.
 FAQ
 Questions? Leave a message!


Copyright © Scholarfriends · High quality services·