ExamGecko

Palo Alto Networks PCCSE Practice Test - Questions Answers

Question list
Search
Search

List of questions

Search

A customer wants to be notified about port scanning network activities in their environment. Which policy type detects this behavior?

A.
Network
A.
Network
Answers
B.
Port Scan
B.
Port Scan
Answers
C.
Anomaly
C.
Anomaly
Answers
D.
Config
D.
Config
Answers
Suggested answer: C

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/anomaly-policies

A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80.

Which port should the team specify in the CNAF rule to protect the application?

A.
443
A.
443
Answers
B.
80
B.
80
Answers
C.
8080
C.
8080
Answers
D.
8888
D.
8888
Answers
Suggested answer: C

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/19-11/prisma-cloud-compute-edition-admin/firewalls/deploy_cnaf

When configuring Cloud Native Application Firewall (CNAF) rules, the specified port should be the one where the container itself listens for web traffic. In this scenario, since the NGINX container is listening on port 8080, the CNAF rule should be configured to protect traffic on port 8080. This ensures that the firewall rule is applied to the traffic intended for the container, regardless of the port mapping on the host.

The documentation from Palo Alto Networks provides guidance on deploying CNAF and specifies that the port in the firewall rule should match the container's listening port, not the host's mapped port. This is an important distinction for properly securing containerized applications with CNAF.

Which three types of buckets exposure are available in the Data Security module? (Choose three.)

A.
Public
A.
Public
Answers
B.
Private
B.
Private
Answers
C.
International
C.
International
Answers
D.
Differential
D.
Differential
Answers
E.
Conditional
E.
Conditional
Answers
Suggested answer: A, B, E

Explanation:

In the Data Security module of cloud security platforms like Prisma Cloud, the types of bucket exposures typically include Public (option A), Private (option B), and Conditional (option E). Public buckets are accessible by anyone on the internet, posing a significant data leakage risk. Private buckets are restricted to authorized users only, offering a higher level of security. Conditional exposure involves buckets that may be accessible under certain conditions or to specific users, requiring careful configuration and policy enforcement to prevent unauthorized access. International (option C) and Differential (option D) do not represent standard types of bucket exposures in cloud security contexts.

The administrator wants to review the Console audit logs from within the Console.

Which page in the Console should the administrator use to review this data, if it can be reviewed at all?

A.
Navigate to Monitor > Events > Host Log Inspection
A.
Navigate to Monitor > Events > Host Log Inspection
Answers
B.
The audit logs can be viewed only externally to the Console
B.
The audit logs can be viewed only externally to the Console
Answers
C.
Navigate to Manage > Defenders > View Logs
C.
Navigate to Manage > Defenders > View Logs
Answers
D.
Navigate to Manage > View Logs > History
D.
Navigate to Manage > View Logs > History
Answers
Suggested answer: D

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/audit/audit_admin_activity

Which statement is true regarding CloudFormation templates?

A.
Scan support does not currently exist for nested references, macros, or intrinsic functions.
A.
Scan support does not currently exist for nested references, macros, or intrinsic functions.
Answers
B.
A single template or a zip archive of template files cannot be scanned with a single API request.
B.
A single template or a zip archive of template files cannot be scanned with a single API request.
Answers
C.
Request-Header-Field 'cloudformation-version' is required to request a scan.
C.
Request-Header-Field 'cloudformation-version' is required to request a scan.
Answers
D.
Scan support is provided for JSON, HTML and YAML formats.
D.
Scan support is provided for JSON, HTML and YAML formats.
Answers
Suggested answer: A

Explanation:

CloudFormation templates, used to describe and provision all the infrastructure resources in cloud environments, support various elements including resources, mappings, parameters, and outputs. However, scan support for CloudFormation templates does not currently exist for nested references, macros, or intrinsic functions (option A). These advanced CloudFormation features can introduce complexity in scanning and interpreting the templates accurately for security and compliance checks.

Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.

Where should the customer navigate in Console?

A.
Monitor > Compliance
A.
Monitor > Compliance
Answers
B.
Defend > Compliance
B.
Defend > Compliance
Answers
C.
Manage > Compliance
C.
Manage > Compliance
Answers
D.
Custom > Compliance
D.
Custom > Compliance
Answers
Suggested answer: B

Explanation:

In the context of Prisma Cloud by Palo Alto Networks, the correct navigation to identify alerted compliance checks set by default is under the 'Defend' section, specifically at 'Defend > Compliance.' This section is designed to allow users to configure and manage compliance policies and rules, monitor compliance statuses, and review alerts related to compliance violations. The 'Defend' section is tailored for setting up defenses, including compliance standards, against potential security risks within the cloud environment, making it the logical location for managing and reviewing compliance-related alerts and settings.

Which container scan is constructed correctly?

A.
twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 -- container myimage/latest
A.
twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 -- container myimage/latest
Answers
B.
twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/ latest
B.
twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/ latest
Answers
C.
twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 --details myimage/latest
C.
twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 --details myimage/latest
Answers
D.
twistcli images scan -u api -p api --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest
D.
twistcli images scan -u api -p api --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest
Answers
Suggested answer: C

Explanation:

The correct construction for a container scan using the TwistCLI tool provided by Prisma Cloud (formerly Twistlock) is shown in option C. This command uses the TwistCLI tool to scan a container image, specifying the necessary authentication credentials (username and password with '-u' and '-p' flags), the address of the Prisma Cloud instance (with the '--address' flag), and the image to be scanned (in this case, 'myimage/latest'). The inclusion of the '--details' flag is a common practice to obtain detailed scan results, which is crucial for in-depth analysis and remediation efforts. This command structure aligns with the standard usage of TwistCLI for image scanning purposes, as documented in Prisma Cloud's official resources and guides.

The development team wants to fail CI jobs where a specific CVE is contained within the image. How should the development team configure the pipeline or policy to produce this outcome?

A.
Set the specific CVE exception as an option in Jenkins or twistcli.
A.
Set the specific CVE exception as an option in Jenkins or twistcli.
Answers
B.
Set the specific CVE exception as an option in Defender running the scan.
B.
Set the specific CVE exception as an option in Defender running the scan.
Answers
C.
Set the specific CVE exception as an option using the magic string in the Console.
C.
Set the specific CVE exception as an option using the magic string in the Console.
Answers
D.
Set the specific CVE exception in Console's CI policy.
D.
Set the specific CVE exception in Console's CI policy.
Answers
Suggested answer: D

Explanation:

Reference tech docs: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/continuous_integration/set_policy_ci_plugins.html

Vulnerability rules that target the build tool can allow specific vulnerabilities by creating an exception and setting the effect to 'ignore'. Block them by creating an exception and setting hte effect to 'fail'. For example, you could create a vulnerability rule that explicitly allows CVE-2018-1234 to suppress warnings in the scan results.

To fail CI jobs based on a specific CVE contained within an image, the development team should configure the policy within Prisma Cloud's Console, specifically within the Continuous Integration (CI) policy settings. By setting a specific CVE exception in the CI policy, the team can define criteria that will cause the CI process to fail if the specified CVE is detected in the scanned image. This approach allows for granular control over the build process, ensuring that images with known vulnerabilities are not promoted through the CI/CD pipeline, thereby maintaining the security posture of the deployed applications. This method is in line with best practices for integrating security into the CI/CD process, allowing for automated enforcement of security standards directly within the development pipeline.

https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000oMkpCAE&lang=en_US%E2%80%A9&refURL=http%3A%2F%2Fknowledgebase.paloaltonetworks.com%2FKCSArticleDetail

Which three types of classifications are available in the Data Security module? (Choose three.)

A.
Personally identifiable information
A.
Personally identifiable information
Answers
B.
Malicious IP
B.
Malicious IP
Answers
C.
Compliance standard
C.
Compliance standard
Answers
D.
Financial information
D.
Financial information
Answers
E.
Malware
E.
Malware
Answers
Suggested answer: A, D, E

Explanation:

Palo Alto Networks' Enterprise DLP service and provides data classification that includes built-in data profiles with data patterns that match sensitive information such as PII, health care, financial information and Intellectual Property. In addition to protecting your confidential and sensitive data, your data is also protected against threats---known and unknown (zero-day) malware---using the Palo Alto Networks' WildFire service.

A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.

How should the administrator configure Prisma Cloud Compute to satisfy this requirement?

A.
set the Container model to manual relearn and set the default runtime rule to block for process protection.
A.
set the Container model to manual relearn and set the default runtime rule to block for process protection.
Answers
B.
set the Container model to relearn and set the default runtime rule to prevent for process protection.
B.
set the Container model to relearn and set the default runtime rule to prevent for process protection.
Answers
C.
add a new runtime policy targeted at a specific Container name, add ransomWare process into the denied process list, and set the action to ''prevent''.
C.
add a new runtime policy targeted at a specific Container name, add ransomWare process into the denied process list, and set the action to ''prevent''.
Answers
D.
choose ''copy into rule'' for the Container, add a ransomWare process into the denied process list, and set the action to ''block''.
D.
choose ''copy into rule'' for the Container, add a ransomWare process into the denied process list, and set the action to ''block''.
Answers
Suggested answer: D

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/runtime_defense/runtime_defense_containers

Total 260 questions
Go to page: of 26