Free preview mode
Enjoy the free questions and consider upgrading to gain full access!
PCCSE
Free trial
Verified
Question 26
When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?
- A: when a serverless repository is scanned
- B: when a Container is started form an Image
- C: when the Image is built and when a Container is started form an Image
- D: when the Image is built
Question 27
Which two required request headers interface with Prisma Cloud API? (Choose two.)
- A: Content-type:application/json
- B: x-redlock-auth
- C: >x-redlock-request-id
- D: Content-type:application/xml
Question 28
An administrator has a requirement to ingest all Console and Defender logs to Splunk.
Which option will satisfy this requirement in Prisma Cloud Compute?
- A: Enable the API settings for logging.
- B: Enable the CSV export in the Console.
- C: Enable the syslog option in the Console
- D: Enable the Splunk option in the Console.
Question 29
The security team wants to enable the “block” option under compliance checks on the host.
What effect will this option have if it violates the compliance check?
- A: The host will be taken offline.
- B: Additional hosts will be prevented form starting.
- C: Containers on a host will be stopped.
- D: No containers will be allowed to start on that host.
Question 30
During an initial deployment of Prisma Cloud Compute, the customer sees vulnerabilities in their environment.
Which statement correctly describes the default vulnerability policy?
- A: It blocks all containers that contain a vulnerability.
- B: It alerts on any container with more than three critical vulnerabilities.
- C: It blocks containers after 30 days if they contain a critical vulnerability.
- D: It alerts on all vulnerabilities, regardless of severity.
Question 31
Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.
Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?
- A: From the deployment page in Console, choose pod name for Console identifier, generate DaemonSet file, and apply the DaemonSet to twistlock namespace.
- B: From the deployment page configure the cloud credential in Console and allow cloud discovery to auto-protect the Kubernetes nodes.
- C: From the deployment page in Console, choose twistlock-console for Console identifier, generate DaemonSet file, and apply DaemonSet to the twistlock namespace.
- D: From the deployment page in Console, choose twistlock-console for Console identifier, and run the curl | bash script on the master Kubernetes node.
Question 32
Which RQL query type is invalid?
- A: Event
- B: IAM
- C: Incident
- D: Config
Question 33
On which cloud service providers can you receive new API release information for Prisma Cloud?
- A: AWS, Azure, GCP, Oracle, IBM
- B: AWS, Azure, GCP, Oracle, Alibaba
- C: AWS, Azure, GCP, IBM
- D: AWS, Azure, GCP, IBM, Alibaba
Question 34
Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)
- A: HTTP
- B: SSH
- C: Tomcat Web Connector via AJP
- D: TLS
Question 35
An administrator has deployed Console into a Kubernetes cluster running in AWS. The administrator also has configured a load balancer in TCP passthrough mode to listen on the same ports as the default Prisma Compute Console configuration.
In the build pipeline, the administrator wants twistcli to talk to Console over HTTPS.
Which port will twistcli need to use to access the Prisma Compute APIs?
- A: 8084
- B: 443
- C: 8083
- D: 8081
Question 36
What is the most reliable and extensive source for documentation on Prisma Cloud APIs?
- A: prisma.pan.dev
- B: docs.paloaltonetworks.com
- C: Prisma Cloud Administrator’s Guide
- D: Live Community
Question 37
How often do Defenders share logs with Console?
- A: Every 10 minutes
- B: Every 30 minutes
- C: Every 1 hour
- D: Real time
Question 38
In Prisma Cloud Software Release 22.06 (Kepler), which Registry type is added?
- A: Azure Container Registry
- B: Google Artifact Registry
- C: IBM Cloud Container Registry
- D: Sonatype Nexus
Question 39
Which three actions are required in order to use the automated method within Azure Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose three.)
- A: Install boto3 & requests library.
- B: Configure IAM Azure remediation script.
- C: Integrate with Azure Service Bus.
- D: Configure IAM AWS remediation script.
- E: Install azure.servicebus & requests library.
Question 40
Which two roles have access to view the Prisma Cloud policies? (Choose two.)
- A: Build AND Deploy Security
- B: Auditor
- C: Dev SecOps
- D: Defender Manager
Question 41
Which three elements are part of SSH Events in Host Observations? (Choose three.)
- A: Startup process
- B: User
- C: System calls
- D: Process path
- E: Command
Question 42
Which two variables must be modified to achieve automatic remediation for identity and access management (IAM) alerts in Azure cloud? (Choose two.)
- A: API_ENDPOINT
- B: SQS_QUEUE_NAME
- C: SB_QUEUE_KEY
- D: YOUR_ACCOUNT_NUMBER
Question 43
An administrator has added a Cloud account on Prisma Cloud and then deleted it.
What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?
- A: No alerts will be displayed.
- B: Existing alerts will be displayed again.
- C: New alerts will be generated.
- D: Existing alerts will be marked as resolved.
Question 44
In which two ways can Prisma Cloud images be retrieved in Prisma Cloud Compute Self-Hosted Edition? (Choose two.)
- A: Pull the images from the Prisma Cloud registry without any authentication.
- B: Authenticate with Prisma Cloud registry, and then pull the images from the Prisma Cloud registry.
- C: Retrieve Prisma Cloud images using URL auth by embedding an access token.
- D: Download Prisma Cloud images from github.paloaltonetworks.com.
Question 45
Which action would be applicable after enabling anomalous compute provisioning?
- A: It detects the activity caused by the spambot.
- B: It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment.
- C: It detects potential creation of an unauthorized network of compute instances with AutoFocus.
- D: It detects potential creation of an unauthorized network of compute instances either accidentally or for cryptojacking.
Question 46
A customer is reviewing Container audits, and an audit has identified a cryptominer attack.
Which three options could have generated this audit? (Choose three.)
- A: The value of the mined currency exceeds $100.
- B: High CPU usage over time for the container is detected.
- C: Common cryptominer process name was found.
- D: The mined currency is associated with a user token.
- E: Common cryptominer port usage was found.
Question 47
What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?
- A: It is a unique identifier needed only when Monitor & Protect mode is selected.
- B: It is the resource name for the Prisma Cloud Role.
- C: It is a UUID that establishes a trust relationship between the Prisma Cloud account and the AWS account in order to extract data.
- D: It is the default name of the PrismaCloudApp stack.
Question 48
Which IAM Azure RQL query would correctly generate an output to view users who have sufficient permissions to create security groups within Azure AD and create applications?
- A: config where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions.allowedToCreateSecurityGroups is true and defaultUserRolePermissions.allowedToCreateApps is true
- B: config from cloud.resource where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions exists
- C: config from network where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions.allowedToCreateSecurityGroups is false and defaultUserRolePermissions.allowedToCreateApps is true
- D: config from cloud.resource where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions.allowedToCreateSecurityGroups is true and defaultUserRolePermissions.allowedToCreateApps is true
Question 49
Which two bot types are part of Web Application and API Security (WAAS) bot protection? (Choose two.)
- A: Chat bots
- B: User-defined bots
- C: Unknown bots
- D: Customer bots
Question 50
Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)
- A: Install boto3 & requests library.
- B: Configure IAM Azure remediation script.
- C: Integrate with Azure Service Bus.
- D: Configure IAM AWS remediation script.
Free preview mode
Enjoy the free questions and consider upgrading to gain full access!