Palo Alto PCCET Questions and Answers Which type of cyberattack sends extremely high volumes of network traffic such as packets, data, or transactions that render the victim's network unavailable or unusable? A. distributed denial-of-service (DDoS) B. spamming botnet C. phishing botnet D. denial- of-service (DoS) - answerA Which core component of Cortex combines security orchestration, incident management, and interactive investigation to serve security teams across the incident lifecycle? A. AutoFoc us B. Cortex XDR C. Cortex XSOAR D. Cortex Data Lake - answerC Which type of advanced malware has entire sections of code that serve no purpose other than to change the signature of the malware, thus producing an infinite number of signature hashes for ev en the smallest of malware programs? A. distributed B. polymorphic C. multi-functional D. obfuscated - answerB Which type of phishing attack is specifically directed at senior executives or other high-profile targets within an organization? A. whaling B. watering holeC. pharming D. spear phishing - answerA Which wireless security protocol includes improved security for IoT devices, smart bulbs, wireless appliances, and smart speakers? A. WPA2 B. WPA3 C. WPA1 D. WEP - answerB Which tactic, technique, or procedure (TTP) masks application traffic over port 443