exam questions

Exam PSE Strata All Questions

View all questions & answers for the PSE Strata exam

Exam PSE Strata topic 1 question 44 discussion

Actual exam question from Palo Alto Networks's PSE Strata
Question #: 44
Topic #: 1
[All PSE Strata Questions]

Which three steps in the cyberattack lifecycle does Palo Alto Networks Security Operating Platform prevent? (Choose three.)

  • A. recon the target
  • B. deliver the malware
  • C. exfiltrate data
  • D. weaponize vulnerabilities
  • E. lateral movement
Show Suggested Answer Hide Answer
Suggested Answer: BCE 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
MaxG
9 months, 4 weeks ago
Selected Answer: BCE
The Palo Alto Networks Security Operating Platform is designed to prevent various stages of the cyberattack lifecycle. Specifically, it effectively prevents the following four stages: - Breach the Perimeter: By using advanced threat prevention mechanisms, the platform can stop initial attempts to penetrate the network perimeter. - Lateral Movement: Once inside the network, attackers often try to move laterally to access more systems. The platform uses network segmentation and advanced monitoring to detect and prevent such movements. - Exfiltrate Data: Data exfiltration is the process of unauthorized data transfer out of the network. The platform employs data loss prevention (DLP) technologies to detect and block such attempts. - Deliver the Malware: The platform can prevent malware delivery through its threat prevention capabilities, including anti-malware, anti-spyware, and sandboxing technologies. These steps cover critical phases where the platform can intervene to stop attacks before they cause significant damage.
upvoted 1 times
...
ck19
11 months, 3 weeks ago
Disagree with scanossa. Cyber attack can be prevented by breaking any one of the five cyber attack lifecycle stages. Recon and weaponize occur outside of your network. So the answer is BCE
upvoted 2 times
...
ck19
11 months, 3 weeks ago
Selected Answer: BCE
BCE are correct
upvoted 1 times
...
Gabranch
12 months ago
NOT Weaponization "You cannot defend against this stage of attack because all activity occurs outside of the org's network" https://www.youtube.com/watch?v=GTkHQ-HQbjQ @ 1:42
upvoted 1 times
...
blockface
1 year, 2 months ago
Selected Answer: ABD
Agree with scanossa, ABD is correct https://www.paloaltonetworks.com/cyberpedia/how-to-break-the-cyber-attack-lifecycle
upvoted 1 times
...
scanossa
1 year, 6 months ago
ABD, the question says "prevent". C & E occurs after the threat has control
upvoted 2 times
...
fatehz
1 year, 8 months ago
Selected Answer: BCE
D is not correct because generally the weaponization of the malware is not at the hacker level so we can't prevent it and A is also wrong because we can't prevent from passive recon so BCE are true
upvoted 2 times
...
karksark
1 year, 10 months ago
ACD: https://www.paloaltonetworks.com/cyberpedia/how-to-break-the-cyber-attack-lifecycle
upvoted 1 times
...
Xyn
1 year, 11 months ago
I think BCD is better. Recon, especially passive one cannot be prevented by network security. lateral movement also difficult to stop with firewall since not all traffic will go through firewall (for example, traffic from same network segment). Vulnerability protection is literally the function of IPS
upvoted 1 times
...
madinaes
2 years ago
BCE are OK
upvoted 3 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago