ExamGecko

PCCSE: Prisma Certified Cloud Security Engineer

Prisma Certified Cloud Security Engineer Exam Questions: 260
Prisma Certified Cloud Security Engineer   2.370 Learners
Take Practice Tests
Comming soon
PDF | VPLUS
This study guide should help you understand what to expect on the exam and includes a summary of the topics the exam might cover and links to additional resources. The information and materials in this document should help you focus your studies as you prepare for the exam.

Related questions

Which two statements are true about the differences between build and run config policies? (Choose two.)

A.
Run and Network policies belong to the configuration policy set.
A.
Run and Network policies belong to the configuration policy set.
Answers
B.
Build and Audit Events policies belong to the configuration policy set.
B.
Build and Audit Events policies belong to the configuration policy set.
Answers
C.
Run policies monitor resources, and check for potential issues after these cloud resources are deployed.
C.
Run policies monitor resources, and check for potential issues after these cloud resources are deployed.
Answers
D.
Build policies enable you to check for security misconfigurations in the IaC templates and ensure that these issues do not get into production.
D.
Build policies enable you to check for security misconfigurations in the IaC templates and ensure that these issues do not get into production.
Answers
E.
Run policies monitor network activities in your environment, and check for potential issues during runtime.
E.
Run policies monitor network activities in your environment, and check for potential issues during runtime.
Answers
Suggested answer: C, D

Explanation:

In the context of Prisma Cloud, Build and Run policies serve distinct purposes in securing cloud environments. Build policies are designed to evaluate Infrastructure as Code (IaC) templates before deployment. These policies help identify and remediate security misconfigurations in the development phase, ensuring that vulnerabilities are addressed before the infrastructure is provisioned. This proactive approach enhances security by preventing misconfigurations from reaching production environments.

On the other hand, Run policies are applied to resources that are already deployed in the cloud. These policies continuously monitor the cloud environment, detecting and alerting on potential security issues that arise in the runtime. Run policies help maintain the security posture of cloud resources by identifying deviations from established security baselines and enabling quick remediation of identified issues.

Both Build and Run policies are integral to a comprehensive cloud security strategy, addressing security concerns at different stages of the cloud resource lifecycle---from development and deployment to ongoing operation.

asked 23/09/2024
William Hopson
31 questions

An administrator sees that a runtime audit has been generated for a host. The audit message is:

''Service postfix attempted to obtain capability SHELL by executing /bin/sh /usr/libexec/postfix/postfix- script.stop. Low severity audit, event is automatically added to the runtime model''

Which runtime host policy rule is the root cause for this runtime audit?

A.
Custom rule with specific configuration for file integrity
A.
Custom rule with specific configuration for file integrity
Answers
B.
Custom rule with specific configuration for networking
B.
Custom rule with specific configuration for networking
Answers
C.
Default rule that alerts on capabilities
C.
Default rule that alerts on capabilities
Answers
D.
Default rule that alerts on suspicious runtime behavior
D.
Default rule that alerts on suspicious runtime behavior
Answers
Suggested answer: D

Explanation:

For a runtime audit generated for a host with a message indicating a service attempting to obtain capability by executing a script, the root cause for this runtime audit is most likely related to D. Default rule that alerts on suspicious runtime behavior. This default rule is designed to flag unusual or potentially harmful activities that could indicate a security risk, prompting further investigation.

asked 23/09/2024
Martin Mannsbarth
32 questions

Which two statements explain differences between build and run config policies? (Choose two.)

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Which two information types cannot be seen in the data security dashboard? (Choose two).

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

An administrator needs to detect and alert on any activities performed by a root account.

Which policy type should be used?

A.
config-run
A.
config-run
Answers
B.
config-build
B.
config-build
Answers
C.
network
C.
network
Answers
D.
audit event
D.
audit event
Answers
Suggested answer: D

Explanation:

To detect and alert on activities performed by a root account, an audit event policy should be used. An audit event policy is a type of policy that can be used to detect suspicious activities or events that may be related to security threats. This type of policy will allow the administrator to monitor and alert on any activities performed by a root account.

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/prisma-cloud-threat-detection

The correct policy type to use in order to detect and alert on any activities performed by a root account is an 'audit event' policy. An audit event policy is designed to monitor and record a series of chronological events in the order they occur, typically used to track user activities and changes within the system. When a root account performs any actions, an audit event policy will log these events, allowing the administrator to review and potentially set up alerts if suspicious or unauthorized activities are detected. This type of policy is crucial for security and compliance purposes as it helps ensure that all actions performed with root privileges are legitimate and authorized.

Reference to this can be found in most cloud security platforms that offer CSPM (Cloud Security Posture Management) solutions. For example, within Prisma Cloud by Palo Alto Networks, audit events are a part of the Activity Monitoring features, which track user activities and system changes to facilitate investigations into suspicious or unauthorized actions.

asked 23/09/2024
Lawrence Bargers
32 questions

You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant's existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.

Which option shows the steps required during the alert rule creation process to achieve this objective?

A.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select ''select all policies'' checkbox as part of the alert rule Confirm the alert rule
A.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select ''select all policies'' checkbox as part of the alert rule Confirm the alert rule
Answers
B.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select one or more policies checkbox as part of the alert rule Confirm the alert rule
B.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select one or more policies checkbox as part of the alert rule Confirm the alert rule
Answers
C.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select one or more policies as part of the alert rule Add alert notifications Confirm the alert rule
C.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select one or more policies as part of the alert rule Add alert notifications Confirm the alert rule
Answers
D.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select ''select all policies'' checkbox as part of the alert rule Add alert notifications Confirm the alert rule
D.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select ''select all policies'' checkbox as part of the alert rule Add alert notifications Confirm the alert rule
Answers
Suggested answer: A

Explanation:

To immediately see all alerts associated with a newly onboarded public cloud account based on existing enabled policies, it is essential to assign the account to an account group and then create an alert rule that applies to this account group. By selecting 'select all policies,' the alert rule will trigger alerts for all existing enabled policies without the need to specify individual policies or add alert notifications for downstream applications.

asked 23/09/2024
Karlis Priede
34 questions

Review this admission control policy:

match[{'msg': msg}] { input.request.operation == 'CREATE' input.request.kind.kind == 'Pod' input.request.resource.resource == 'pods'

input.request.object.spec.containers[_].securityContext.privileged msg := 'Privileged'

}

Which response to this policy will be achieved when the effect is set to ''block''?

A.
The policy will block all pods on a Privileged host.
A.
The policy will block all pods on a Privileged host.
Answers
B.
The policy will replace Defender with a privileged Defender.
B.
The policy will replace Defender with a privileged Defender.
Answers
C.
The policy will alert only the administrator when a privileged pod is created.
C.
The policy will alert only the administrator when a privileged pod is created.
Answers
D.
The policy will block the creation of a privileged pod.
D.
The policy will block the creation of a privileged pod.
Answers
Suggested answer: D

Explanation:

The given admission control policy is designed to evaluate pod creation requests in a Kubernetes environment, specifically targeting the creation of privileged pods, which can pose significant security risks.

Option D: The policy will block the creation of a privileged pod is the correct answer when the effect of the policy is set to ''block''. In this context, the policy's logic checks if a pod being created is set to run in privileged mode (a high-risk configuration that grants the pod extended system privileges). If such a configuration is detected, the policy triggers an action to block the pod's creation, thereby preventing the deployment of privileged pods that could undermine the security posture of the Kubernetes environment.

Kubernetes Admission Controllers Documentation: Provides a comprehensive overview of admission controllers in Kubernetes, including how they can be used to enforce policy decisions, such as preventing the creation of privileged pods.

Best Practices for Kubernetes Security: Discusses the importance of admission control policies in maintaining the security and integrity of Kubernetes environments, with specific emphasis on the risks associated with privileged pods.

asked 23/09/2024
daniel valdera carrasco
42 questions

How are the following categorized?

Backdoor account access Hijacked processes Lateral movement

Port scanning

A.
audits
A.
audits
Answers
B.
incidents
B.
incidents
Answers
C.
admission controllers
C.
admission controllers
Answers
D.
models
D.
models
Answers
Suggested answer: B

Explanation:

The activities listed (Backdoor account access, Hijacked processes, Lateral movement, Port scanning) are categorized as incidents (option B). Incidents represent security events or patterns of activity that indicate potential security breaches or malicious behavior within the environment. Prisma Cloud identifies and classifies such activities as incidents to highlight significant security concerns that require investigation and potential remediation. This categorization helps security teams prioritize their response efforts, focusing on activities that pose a real threat to the integrity and security of the cloud environment. By distinguishing incidents from other types of security findings, Prisma Cloud enables more effective incident response and threat management processes.

asked 23/09/2024
Javier Portabales
40 questions

A Prisma Cloud Administrator onboarded an AWS cloud account with agentless scanning enabled successfully to Prisma Cloud. Which item requires deploying defenders to be able to inspect the risk on the onboarded AWS account?

Become a Premium Member for full access
Unlock Premium Member  Unlock Premium Member

Which action must be taken to enable a user to interact programmatically with the Prisma Cloud APIs and for a nonhuman entity to be enabled for the access keys?

A.
Create a role with System Admin and generate access keys.
A.
Create a role with System Admin and generate access keys.
Answers
B.
Create a user with a role that has minimal access.
B.
Create a user with a role that has minimal access.
Answers
C.
Create a role with Account Group Read Only and assign it to the user.
C.
Create a role with Account Group Read Only and assign it to the user.
Answers
D.
Create a role and assign it to the Service Account.
D.
Create a role and assign it to the Service Account.
Answers
Suggested answer: D

Explanation:

To enable a user to interact programmatically with Prisma Cloud APIs and for a nonhuman entity to access keys, the correct action is to create a role and assign it to the Service Account (D). Service accounts in Prisma Cloud are designed for programmatic access by applications or automated tools, allowing these entities to interact with Prisma Cloud APIs securely. By creating a specific role with the necessary permissions and assigning it to a service account, administrators can ensure that the entity has the appropriate level of access required for its operations, aligning with the principle of least privilege and enhancing the security posture of API interactions.

asked 23/09/2024
B Erol
57 questions