Free preview mode

Enjoy the free questions and consider upgrading to gain full access!

PCCSEFree trialFree trial

By palo-alto-networks
Aug, 2025

Verified

25Q per page

Question 26

When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?

  • A: when a serverless repository is scanned
  • B: when a Container is started form an Image
  • C: when the Image is built and when a Container is started form an Image
  • D: when the Image is built

Question 27

Which two required request headers interface with Prisma Cloud API? (Choose two.)

  • A: Content-type:application/json
  • B: x-redlock-auth
  • C: >x-redlock-request-id
  • D: Content-type:application/xml

Question 28

An administrator has a requirement to ingest all Console and Defender logs to Splunk.

Which option will satisfy this requirement in Prisma Cloud Compute?

  • A: Enable the API settings for logging.
  • B: Enable the CSV export in the Console.
  • C: Enable the syslog option in the Console
  • D: Enable the Splunk option in the Console.

Question 29

The security team wants to enable the “block” option under compliance checks on the host.

What effect will this option have if it violates the compliance check?

  • A: The host will be taken offline.
  • B: Additional hosts will be prevented form starting.
  • C: Containers on a host will be stopped.
  • D: No containers will be allowed to start on that host.

Question 30

During an initial deployment of Prisma Cloud Compute, the customer sees vulnerabilities in their environment.

Which statement correctly describes the default vulnerability policy?

  • A: It blocks all containers that contain a vulnerability.
  • B: It alerts on any container with more than three critical vulnerabilities.
  • C: It blocks containers after 30 days if they contain a critical vulnerability.
  • D: It alerts on all vulnerabilities, regardless of severity.

Question 31

Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.

Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?

  • A: From the deployment page in Console, choose pod name for Console identifier, generate DaemonSet file, and apply the DaemonSet to twistlock namespace.
  • B: From the deployment page configure the cloud credential in Console and allow cloud discovery to auto-protect the Kubernetes nodes.
  • C: From the deployment page in Console, choose twistlock-console for Console identifier, generate DaemonSet file, and apply DaemonSet to the twistlock namespace.
  • D: From the deployment page in Console, choose twistlock-console for Console identifier, and run the curl | bash script on the master Kubernetes node.

Question 32

Which RQL query type is invalid?

  • A: Event
  • B: IAM
  • C: Incident
  • D: Config

Question 33

On which cloud service providers can you receive new API release information for Prisma Cloud?

  • A: AWS, Azure, GCP, Oracle, IBM
  • B: AWS, Azure, GCP, Oracle, Alibaba
  • C: AWS, Azure, GCP, IBM
  • D: AWS, Azure, GCP, IBM, Alibaba

Question 34

Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)

  • A: HTTP
  • B: SSH
  • C: Tomcat Web Connector via AJP
  • D: TLS

Question 35

An administrator has deployed Console into a Kubernetes cluster running in AWS. The administrator also has configured a load balancer in TCP passthrough mode to listen on the same ports as the default Prisma Compute Console configuration.
In the build pipeline, the administrator wants twistcli to talk to Console over HTTPS.
Which port will twistcli need to use to access the Prisma Compute APIs?

  • A: 8084
  • B: 443
  • C: 8083
  • D: 8081

Question 36

What is the most reliable and extensive source for documentation on Prisma Cloud APIs?

  • A: prisma.pan.dev
  • B: docs.paloaltonetworks.com
  • C: Prisma Cloud Administrator’s Guide
  • D: Live Community

Question 37

How often do Defenders share logs with Console?

  • A: Every 10 minutes
  • B: Every 30 minutes
  • C: Every 1 hour
  • D: Real time

Question 38

In Prisma Cloud Software Release 22.06 (Kepler), which Registry type is added?

  • A: Azure Container Registry
  • B: Google Artifact Registry
  • C: IBM Cloud Container Registry
  • D: Sonatype Nexus

Question 39

Which three actions are required in order to use the automated method within Azure Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose three.)

  • A: Install boto3 & requests library.
  • B: Configure IAM Azure remediation script.
  • C: Integrate with Azure Service Bus.
  • D: Configure IAM AWS remediation script.
  • E: Install azure.servicebus & requests library.

Question 40

Which two roles have access to view the Prisma Cloud policies? (Choose two.)

  • A: Build AND Deploy Security
  • B: Auditor
  • C: Dev SecOps
  • D: Defender Manager

Question 41

Which three elements are part of SSH Events in Host Observations? (Choose three.)

  • A: Startup process
  • B: User
  • C: System calls
  • D: Process path
  • E: Command

Question 42

Which two variables must be modified to achieve automatic remediation for identity and access management (IAM) alerts in Azure cloud? (Choose two.)

  • A: API_ENDPOINT
  • B: SQS_QUEUE_NAME
  • C: SB_QUEUE_KEY
  • D: YOUR_ACCOUNT_NUMBER

Question 43

An administrator has added a Cloud account on Prisma Cloud and then deleted it.

What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?

  • A: No alerts will be displayed.
  • B: Existing alerts will be displayed again.
  • C: New alerts will be generated.
  • D: Existing alerts will be marked as resolved.

Question 44

In which two ways can Prisma Cloud images be retrieved in Prisma Cloud Compute Self-Hosted Edition? (Choose two.)

  • A: Pull the images from the Prisma Cloud registry without any authentication.
  • B: Authenticate with Prisma Cloud registry, and then pull the images from the Prisma Cloud registry.
  • C: Retrieve Prisma Cloud images using URL auth by embedding an access token.
  • D: Download Prisma Cloud images from github.paloaltonetworks.com.

Question 45

Which action would be applicable after enabling anomalous compute provisioning?

  • A: It detects the activity caused by the spambot.
  • B: It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment.
  • C: It detects potential creation of an unauthorized network of compute instances with AutoFocus.
  • D: It detects potential creation of an unauthorized network of compute instances either accidentally or for cryptojacking.

Question 46

A customer is reviewing Container audits, and an audit has identified a cryptominer attack.
Which three options could have generated this audit? (Choose three.)

  • A: The value of the mined currency exceeds $100.
  • B: High CPU usage over time for the container is detected.
  • C: Common cryptominer process name was found.
  • D: The mined currency is associated with a user token.
  • E: Common cryptominer port usage was found.

Question 47

What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?

  • A: It is a unique identifier needed only when Monitor & Protect mode is selected.
  • B: It is the resource name for the Prisma Cloud Role.
  • C: It is a UUID that establishes a trust relationship between the Prisma Cloud account and the AWS account in order to extract data.
  • D: It is the default name of the PrismaCloudApp stack.

Question 48

Which IAM Azure RQL query would correctly generate an output to view users who have sufficient permissions to create security groups within Azure AD and create applications?

  • A: config where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions.allowedToCreateSecurityGroups is true and defaultUserRolePermissions.allowedToCreateApps is true
  • B: config from cloud.resource where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions exists
  • C: config from network where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions.allowedToCreateSecurityGroups is false and defaultUserRolePermissions.allowedToCreateApps is true
  • D: config from cloud.resource where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions.allowedToCreateSecurityGroups is true and defaultUserRolePermissions.allowedToCreateApps is true

Question 49

Which two bot types are part of Web Application and API Security (WAAS) bot protection? (Choose two.)

  • A: Chat bots
  • B: User-defined bots
  • C: Unknown bots
  • D: Customer bots

Question 50

Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)

  • A: Install boto3 & requests library.
  • B: Configure IAM Azure remediation script.
  • C: Integrate with Azure Service Bus.
  • D: Configure IAM AWS remediation script.
Page 2 of 10 • Questions 26-50 of 247

Free preview mode

Enjoy the free questions and consider upgrading to gain full access!