Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

PCCSE Exam Dumps - Prisma Certified Cloud Security Engineer

Question # 4

A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)

A.

The value of the mined currency exceeds $100.

B.

High CPU usage over time for the container is detected.

C.

Common cryptominer process name was found.

D.

The mined currency is associated with a user token.

E.

Common cryptominer port usage was found.

Full Access
Question # 5

What is an example of an outbound notification within Prisma Cloud?

A.

AWS Inspector

B.

Qualys

C.

Tenable

D.

PagerDuty

Full Access
Question # 6

An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant.

In which order will the APIs be executed for this service?

(Drag the steps into the correct order of occurrence, from the first step to the last.)

Full Access
Question # 7

An administrator for Prisma Cloud needs to obtain a graphical view to monitor all connections, including connections across hosts and connections to any configured network objects.

Which setting does the administrator enable or configure to accomplish this task?

A.

ADEM

B.

WAAS Analytics

C.

Telemetry

D.

Cloud Native Network Firewall

E.

Host Insight

Full Access
Question # 8

A customer is interested in PCI requirements and needs to ensure that no privilege containers can start in the environment.

Which action needs to be set for “do not use privileged containers”?

A.

Prevent

B.

Alert

C.

Block

D.

Fail

Full Access
Question # 9

Which three steps are involved in onboarding an account for Data Security? (Choose three.)

A.

Create a read-only role with in-line policies

B.

Create a Cloudtrail with SNS Topic

C.

Enable Flow Logs

D.

Enter the RoleARN and SNSARN

E.

Create a S3 bucket

Full Access
Question # 10

Which three public cloud providers are supported for VM image scanning? (Choose three.)

A.

GCP

B.

Alibaba

C.

Oracle

D.

AWS

E.

Azure

Full Access
Question # 11

Where can Defender debug logs be viewed? (Choose two.)

A.

/var/lib/twistlock/defender.log

B.

From the Console, Manage > Defenders > Manage > Defenders. Select the Defender from the deployed Defenders list, then click Actions > Logs

C.

From the Console, Manage > Defenders > Deploy > Defenders. Select the Defender from the deployed Defenders list, then click Actions > Logs

D.

/var/lib/twistlock/log/defender.log

Full Access
Question # 12

Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).

A.

Spoke Account Mode

B.

Hub Account Mode

C.

Same Account Mode

D.

Main Account Mode

Full Access
Question # 13

Where are Top Critical CVEs for deployed images found?

A.

Defend → Vulnerabilities → Code Repositories

B.

Defend → Vulnerabilities → Images

C.

Monitor → Vulnerabilities → Vulnerabilities Explorer

D.

Monitor → Vulnerabilities → Images

Full Access
Question # 14

What are two ways to scan container images in Jenkins pipelines? (Choose two.)

A.

twistcli

B.

Jenkins Docker plugin

C.

Compute Jenkins plugin

D.

Compute Azure DevOps plugin

E.

Prisma Cloud Visual Studio Code plugin with Jenkins integration

Full Access
Question # 15

Which ban for DoS protection will enforce a rate limit for users who are unable to post five (5) “. tar.gz" files within five (5) seconds?

A.

One with an average rate of 5 and file extensions match on “. tar.gz" on Web Application and API Security (WAAS)

B.

One with an average rate of 5 and file extensions match on “. tar.gz" on Cloud Native Network Firewall (CNNF)

C.

One with a burst rate of 5 and file extensions match on “. tar.gz" on Web Application and API Security (WAAS) *

D.

One with a burst rate of 5 and file extensions match on “. tar.gz" on Cloud Native Network Firewall (CNNF)

Full Access
Question # 16

A customer wants to harden its environment from misconfiguration.

Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)

A.

Docker daemon configuration files

B.

Docker daemon configuration

C.

Host cloud provider tags

D.

Host configuration

E.

Hosts without Defender agents

Full Access
Question # 17

The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.

Which type of policy should be created to protect this pod from Layer7 attacks?

A.

The development team should create a WAAS rule for the host where these pods will be running.

B.

The development team should create a WAAS rule targeted at all resources on the host.

C.

The development team should create a runtime policy with networking protections.

D.

The development team should create a WAAS rule targeted at the image name of the pods.

Full Access
Question # 18

Which resource and policy type are used to calculate AWS Net Effective Permissions? (Choose two.)

A.

Service Linked Roles

B.

Lambda Function

C.

Amazon Resource Names (ARNs) using Wild Cards

D.

AWS Service Control Policies (SCPs)

Full Access
Question # 19

What is the behavior of Defenders when the Console is unreachable during upgrades?

A.

Defenders continue to alert, but not enforce, using the policies and settings most recently cached before upgrading the Console.

B.

Defenders will fail closed until the web-socket can be re-established.

C.

Defenders will fail open until the web-socket can be re-established.

D.

Defenders continue to alert and enforce using the policies and settings most recently cached before upgrading the Console.

Full Access
Question # 20

A security team has a requirement to ensure the environment is scanned for vulnerabilities. What are three options for configuring vulnerability policies? (Choose three.)

A.

individual actions based on package type

B.

output verbosity for blocked requests

C.

apply policy only when vendor fix is available

D.

individual grace periods for each severity level

E.

customize message on blocked requests

Full Access
Question # 21

Which two statements are true about the differences between build and run config policies? (Choose two.)

A.

Run and Network policies belong to the configuration policy set.

B.

Build and Audit Events policies belong to the configuration policy set.

C.

Run policies monitor resources, and check for potential issues after these cloud resources are deployed.

D.

Build policies enable you to check for security misconfigurations in the IaC templates and ensure that these issues do not get into production.

E.

Run policies monitor network activities in your environment, and check for potential issues during runtime.

Full Access
Question # 22

A customer wants to monitor the company’s AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now.

Which two pieces of information do you need to onboard this account? (Choose two.)

A.

Cloudtrail

B.

Subscription ID

C.

Active Directory ID

D.

External ID

E.

Role ARN

Full Access
Question # 23

A customer has a requirement to scan serverless functions for vulnerabilities.

What is the correct option to configure scanning?

A.

Configure serverless radar from the Defend > Compliance > Cloud Platforms page.

B.

Embed serverless Defender into the function.

C.

Configure a function scan policy from the Defend > Vulnerabilities > Functions page.

D.

Use Lambda layers to deploy a Defender into the function.

Full Access
Question # 24

Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.

Where should the customer navigate in Console?

A.

Monitor > Compliance

B.

Defend > Compliance

C.

Manage > Compliance

D.

Custom > Compliance

Full Access
Question # 25

Which two filters are available in the SecOps dashboard? (Choose two.)

A.

Time range

B.

Account Groups

C.

Service Name

D.

Cloud Region

Full Access
Question # 26

A customer has a development environment with 50 connected Defenders. A maintenance window is set for Monday to upgrade 30 stand-alone Defenders in the development environment, but there is no maintenance window available until Sunday to upgrade the remaining 20 stand-alone Defenders.

Which recommended action manages this situation?

A.

Go to Manage > Defender > Manage, then click Defenders, and use the Scheduler to choose which Defenders will be automatically upgraded during the maintenance window.

B.

Find a maintenance window that is suitable to upgrade all stand-alone Defenders in the development environment.

C.

Upgrade a subset of the Defenders by clicking the individual Actions > Upgrade button in the row that corresponds to the Defender that should be upgraded during the maintenance window.

D.

Open a support case with Palo Alto Networks to arrange an automatic upgrade.

Full Access
Question # 27

Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?

A.

High

B.

Medium

C.

Low

D.

Very High

Full Access
Question # 28

During the Learning phase of the Container Runtime Model, Prisma Cloud enters a “dry run” period for how many hours?

A.

4

B.

48

C.

1

D.

24

Full Access
Question # 29

Which three AWS policy types and identities are used to calculate the net effective permissions? (Choose three).

A.

AWS service control policies (SCPs)

B.

AWS IAM group

C.

AWS IAM role

D.

AWS IAM User

E.

AWS IAM tag policy

Full Access
Question # 30

What is the order of steps to create a custom network policy?

(Drag the steps into the correct order of occurrence, from the first step to the last.)

Full Access
Question # 31

When an alert notification from the alarm center is deleted, how many hours will a similar alarm be suppressed by default?

A.

12

B.

8

C.

24

D.

4

Full Access
Question # 32

A Prisma Cloud Administrator onboarded an AWS cloud account with agentless scanning enabled successfully to Prisma Cloud. Which item requires deploying defenders to be able to inspect the risk on the onboarded AWS account?

A.

Host compliances risks

B.

Container runtime risks

C.

Container vulnerability risks

D.

Host vulnerability risks

Full Access
Question # 33

How does assigning an account group to an administrative user on Prisma Cloud help restrict access to resources?

A.

It restricts access only to certain types of resources within the cloud account.

B.

It restricts access to all resources and data within the cloud account.

C.

It restricts access only to the resources and data that pertains to the cloud account(s) within an account group.

D.

It does not restrict access to any resources within the cloud account.

Full Access
Question # 34

Which two frequency options are available to create a compliance report within the console? (Choose two.)

A.

One-time

B.

Monthly

C.

Recurring

D.

Weekly

Full Access
Question # 35

Which two bot categories belong to unknown bots under Web-Application and API Security (WAAS) bot protection? (Choose two.)

A.

News bots

B.

Search engine crawlers

C.

Web scrapers

D.

HTTP libraries

Full Access
Question # 36

Which two attributes are required for a custom config RQL? (Choose two.)

A.

json.rule

B.

cloud.account

C.

api.name

D.

tag

Full Access
Question # 37

Which statement applies to Adoption Advisor?

A.

It helps adopt security capabilities at a fixed pace regardless of the organization's needs.

B.

It only provides guidance during the deploy phase of the application lifecycle.

C.

It is only available for organizations that have completed the cloud adoption journey.

D.

It includes security capabilities from subscriptions for CSPM, CWP, CCS, OEM, and Data Security.

Full Access
Question # 38

A Prisma Cloud administrator is tasked with pulling a report via API. The Prisma Cloud tenant is located on app2.prismacloud.io.

What is the correct API endpoint?

A.

https://api.prismacloud.io

B.

https://api2.eu.prismacloud.io

C.

httsp://api.prismacloud.cn

D.

https://api2.prismacloud.io

Full Access
Question # 39

A customer has a requirement to scan serverless functions for vulnerabilities.

Which three settings are required to configure serverless scanning? (Choose three.)

A.

Defender Name

B.

Region

C.

Credential

D.

Console Address

E.

Provider

Full Access
Question # 40

Which command correctly outputs scan results to stdout in tabular format and writes scan results to a JSON file while still sending the results to Console?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 41

On which cloud service providers can new API release information for Prisma Cloud be received?

A.

AWS. Azure. GCP. Oracle, IBM

B.

AWS. Azure. GCP, IBM, Alibaba

C.

AWS. Azure. GCP. Oracle, Alibaba

D.

AWS. Azure. GCP, IBM

Full Access
Question # 42

Prisma Cloud supports sending audit event records to which three targets? (Choose three.)

A.

SNMP Traps

B.

Stdout

C.

Netflow

D.

Prometheus

E.

Syslog

Full Access
Question # 43

Which three types of buckets exposure are available in the Data Security module? (Choose three.)

A.

Public

B.

Private

C.

International

D.

Differential

E.

Conditional

Full Access
Question # 44

Which order of steps map a policy to a custom compliance standard?

(Drag the steps into the correct order of occurrence, from the first step to the last.)

Full Access
Question # 45

A customer wants to turn on Auto Remediation.

Which policy type has the built-in CLI command for remediation?

A.

Anomaly

B.

Audit Event

C.

Network

D.

Config

Full Access
Question # 46

An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.

What does the administrator need to configure?

A.

A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on WAAS

B.

A ban for DoS protection with a burst rate of 5 and file extensions match on .tar.gz on CNNF

C.

A ban for DoS protection with a burst rate of 5 and file extensions match on .tar gz on WAAS

D.

A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on CNNF

Full Access
Question # 47

Which option identifies the Prisma Cloud Compute Edition?

A.

Package installed with APT

B.

Downloadable, self-hosted software

C.

Software-as-a-Service (SaaS)

D.

Plugin to Prisma Cloud

Full Access
Question # 48

A manager informs the SOC that one or more RDS instances have been compromised and the SOC needs to make sure production RDS instances are NOT publicly accessible.

Which action should the SOC take to follow security best practices?

A.

Enable “AWS S3 bucket is publicly accessible” policy and manually remediate each alert.

B.

Enable “AWS RDS database instance is publicly accessible” policy and for each alert, check that it is a production instance, and then manually remediate.

C.

Enable “AWS S3 bucket is publicly accessible” policy and add policy to an auto-remediation alert rule.

D.

Enable “AWS RDS database instance is publicly accessible” policy and add policy to an auto-remediation alert rule.

Full Access
Question # 49

A customer has multiple violations in the environment including:

User namespace is enabled

An LDAP server is enabled

SSH root is enabled

Which section of Console should the administrator use to review these findings?

A.

Manage

B.

Vulnerabilities

C.

Radar

D.

Compliance

Full Access
Question # 50

An administrator wants to retrieve the compliance policies for images scanned in a continuous integration (CI) pipeline.

Which endpoint will successfully execute to enable access to the images via API?

A.

GET /api/v22.01/policies/compliance

B.

GET /api/v22.01/policies/compliance/ci

C.

GET /api/v22.01/policies/compliance/ci/images

D.

GET /api/v22.01/policies/compliance/ci/serverless

Full Access
Question # 51

What is required for Prisma Cloud to successfully execute auto-remediation commands?

A.

Read access to the cloud platform

B.

Write access to the cloud platform

C.

Access to the cloud platform only for Azure

D.

Prisma Cloud requires no access to the cloud platform

Full Access
Question # 52

Order the steps involved in onboarding an AWS Account for use with Data Security feature.

Full Access
Question # 53

Which alerts are fixed by enablement of automated remediation?

A.

All applicable open alerts regardless of when they were generated, with alert status updated to "resolved"

B.

Only the open alerts that were generated before the enablement of remediation, with alert status updated to "resolved"

C.

All applicable open alerts regardless of when they were generated, with alert status updated to "dismissed"

D.

Only the open alerts that were generated after the enablement of remediation, with alert status updated to "resolved"

Full Access
Question # 54

In which Console menu would an administrator verify whether a custom compliance check is failing or passing?

A.

Monitor > Compliance

B.

Container Security > Compliance

C.

Defend > Compliance

D.

Custom > Compliance

Full Access
Question # 55

What are two built-in RBAC permission groups for Prisma Cloud? (Choose two.)

A.

Group Membership Admin

B.

Group Admin

C.

Account Group Admin

D.

Account Group Read Only

Full Access
Question # 56

Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)

A.

HTTP

B.

SSH

C.

Tomcat Web Connector via AJP

D.

TLS

Full Access
Question # 57

What is the frequency to create a compliance report? (Choose two.)

A.

Weekly

B.

One time

C.

Monthly

D.

Recurring

Full Access
Question # 58

An administrator sees that a runtime audit has been generated for a container.

The audit message is:

“/bin/ls launched and is explicitly blocked in the runtime rule. Full command: ls -latr”

Which protection in the runtime rule would cause this audit?

A.

Networking

B.

File systems

C.

Processes

D.

Container

Full Access
Question # 59

The development team wants to fail CI jobs where a specific CVE is contained within the image. How should the development team configure the pipeline or policy to produce this outcome?

A.

Set the specific CVE exception as an option in Jenkins or twistcli.

B.

Set the specific CVE exception as an option in Defender running the scan.

C.

Set the specific CVE exception as an option using the magic string in the Console.

D.

Set the specific CVE exception in Console’s CI policy.

Full Access
Question # 60

Which of the following is displayed in the asset inventory?

A.

EC2 instances

B.

Asset tags

C.

SSO users

D.

Federated users

Full Access
Question # 61

How is the scope of each rule determined in the Prisma Cloud Compute host runtime policy?

A.

By the collection assigned to that rule

B.

By the target workload

C.

By the order in which it is created

D.

By the type of network traffic it controls

Full Access
Question # 62

What should be used to associate Prisma Cloud policies with compliance frameworks?

A.

Compliance

B.

Custom compliance

C.

Alert rules

D.

Policies

Full Access
Question # 63

Which container image scan is constructed correctly?

A.

twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/ latest

B.

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest

C.

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest

D.

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest --details

Full Access
Question # 64

An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to YAML.

Console Address: $CONSOLE_ADDRESS Websocket Address: $WEBSOCKET_ADDRESS User: $ADMIN_USER

Which command generates the YAML file for Defender install?

A.

/twistcli defender \

--address $CONSOLE_ADDRESS \

--user $ADMIN_USER \

--cluster-address $CONSOLE_ADDRESS

B.

/twistcli defender export kubernetes \

--address $WEBSOCKET_ADDRESS \

--user $ADMIN_USER \

--cluster-address $CONSOLE_ADDRESS

C.

/twistcli defender YAML kubernetes \

--address $CONSOLE_ADDRESS \

--user $ADMIN_USER \

--cluster-address $WEBSOCKET_ADDRESS

D.

/twistcli defender export kubernetes \

--address $CONSOLE_ADDRESS \

--user $ADMIN_USER \

--cluster-address $WEBSOCKET_ADDRESS

Full Access
Question # 65

Which serverless cloud provider is covered by the "overly permissive service access" compliance check?

A.

Alibaba

B.

Azure

C.

Amazon Web Services (AWS)

D.

Google Cloud Platform (GCP)

Full Access
Question # 66

A customer has serverless functions that are deployed in multiple clouds.

Which serverless cloud provider is covered be “overly permissive service access” compliance check?

A.

Alibaba

B.

GCP

C.

AWS

D.

Azure

Full Access
Question # 67

Which statement accurately characterizes SSO Integration on Prisma Cloud?

A.

Prisma Cloud supports IdP initiated SSO, and its SAML endpoint supports the POST and GET methods.

B.

Okta, Azure Active Directory, PingID, and others are supported via SAML.

C.

An administrator can configure different Identity Providers (IdP) for all the cloud accounts that Prisma Cloud monitors.

D.

An administrator who needs to access the Prisma Cloud API can use SSO after configuration.

Full Access
Question # 68

Which statement is true regarding CloudFormation templates?

A.

Scan support does not currently exist for nested references, macros, or intrinsic functions.

B.

A single template or a zip archive of template files cannot be scanned with a single API request.

C.

Request-Header-Field ‘cloudformation-version’ is required to request a scan.

D.

Scan support is provided for JSON, HTML and YAML formats.

Full Access
Question # 69

Given the following audit event activity snippet:

Which RQL will be triggered by the audit event?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 70

Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?

A.

Host

B.

Container

C.

Functions

D.

Image

Full Access
Question # 71

Which statement is true about obtaining Console images for Prisma Cloud Compute Edition?

A.

To retrieve Prisma Cloud Console images using basic auth:

1.Access registry.paloaltonetworks.com, and authenticate using ‘docker login’.

2.Retrieve the Prisma Cloud Console images using ‘docker pull’.

B.

To retrieve Prisma Cloud Console images using basic auth:

1.Access registry.twistlock.com, and authenticate using ‘docker login’.

2.Retrieve the Prisma Cloud Console images using ‘docker pull’.

C.

To retrieve Prisma Cloud Console images using URL auth:

1.Access registry-url-auth.twistlock.com, and authenticate using the user certificate.

2.Retrieve the Prisma Cloud Console images using ‘docker pull’.

D.

To retrieve Prisma Cloud Console images using URL auth:

1.Access registry-auth.twistlock.com, and authenticate using the user certificate.

2.Retrieve the Prisma Cloud Console images using ‘docker pull’.

Full Access
Question # 72

An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query programmatically the existing users, and the user’s associated permission levels, in a Prisma Cloud Enterprise tenant.

Which public documentation location should be reviewed to help determine the required attributes to carry out this step?

A.

Prisma Cloud Administrator’s Guide (Compute)

B.

Prisma Cloud API Reference

C.

Prisma Cloud Compute API Reference

D.

Prisma Cloud Enterprise Administrator’s Guide

Full Access
Question # 73

What improves product operationalization by adding visibility into feature utilization and missed opportunities?

A.

Adoption Advisor

B.

Alarm Advisor

C.

Alert Center

D.

Alarm Center

Full Access
Question # 74

Prisma Cloud cannot integrate which of the following secrets managers?

A.

IBM Secret Manager

B.

AzureKey Vault

C.

HashiCorp Vault

D.

AWS Secret Manager

Full Access
Question # 75

Which command should be used in the Prisma Cloud twistcli tool to scan the nginx:latest image for vulnerabilities and compliance issues?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access