ExamGecko

Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 11

Question list
Search
Search

List of questions

Search

An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.

What does the administrator need to configure?

A.
A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on WAAS
A.
A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on WAAS
Answers
B.
A ban for DoS protection with a burst rate of 5 and file extensions match on .tar.gz on CNNF
B.
A ban for DoS protection with a burst rate of 5 and file extensions match on .tar.gz on CNNF
Answers
C.
A ban for DoS protection with a burst rate of 5 and file extensions match on .tar gz on WAAS
C.
A ban for DoS protection with a burst rate of 5 and file extensions match on .tar gz on WAAS
Answers
D.
A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on CNNF
D.
A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on CNNF
Answers
Suggested answer: C

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/waas/waas_dos_protection

What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?

A.
policy
A.
policy
Answers
B.
incident
B.
incident
Answers
C.
audit
C.
audit
Answers
D.
anomaly
D.
anomaly
Answers
Suggested answer: B

Explanation:

An automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks is known as an 'incident'. Incidents provide a consolidated view of related security events, making it easier for administrators to understand the scope and potential impact of an attack, and to take appropriate response actions.

A customer wants to monitor the company's AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now.

Which two pieces of information do you need to onboard this account? (Choose two.)

A.
Cloudtrail
A.
Cloudtrail
Answers
B.
Subscription ID
B.
Subscription ID
Answers
C.
Active Directory ID
C.
Active Directory ID
Answers
D.
External ID
D.
External ID
Answers
E.
Role ARN
E.
Role ARN
Answers
Suggested answer: A, E

Explanation:

To onboard an AWS account into Prisma Cloud for the purpose of monitoring resource configurations, the necessary information includes the Role ARN (Amazon Resource Name) and CloudTrail setup. The Role ARN (Option E) is crucial because Prisma Cloud requires permission to access and monitor resources within the AWS account, which is facilitated through an IAM role that Prisma Cloud can assume. This IAM role must have the necessary permissions to access AWS services and resources that Prisma Cloud needs to monitor. CloudTrail (Option A) is essential for auditing and monitoring API calls within the AWS environment, including those related to resource configurations. It provides visibility into user and resource activity by recording API calls made on the account. CloudTrail logs are used by Prisma Cloud to detect changes in resource configurations and ensure compliance with security policies. Subscription ID (Option B) and Active Directory ID (Option C) are more relevant to Azure cloud environments, not AWS. External ID (Option D) is used in a cross-account role trust relationship to prevent the 'confused deputy' problem, but it's not specifically required just to onboard the account for resource configuration monitoring.

An administrator for Prisma Cloud needs to obtain a graphical view to monitor all connections, including connections across hosts and connections to any configured network objects.

Which setting does the administrator enable or configure to accomplish this task?

A.
ADEM
A.
ADEM
Answers
B.
WAAS Analytics
B.
WAAS Analytics
Answers
C.
Telemetry
C.
Telemetry
Answers
D.
Cloud Native Network Firewall
D.
Cloud Native Network Firewall
Answers
E.
Host Insight
E.
Host Insight
Answers
Suggested answer: D

Explanation:

To obtain a graphical view to monitor all connections, including those across hosts and to configured network objects within Prisma Cloud, the appropriate feature to enable or configure is the Cloud Native Network Firewall (Option D). Prisma Cloud's Cloud Native Network Firewall provides visibility into network traffic and allows for the monitoring and control of network flows within the cloud environment, effectively enabling administrators to visualize and secure inter-host communications and connections to network objects. ADEM (Option A) and WAAS Analytics (Option B) are not related to Prisma Cloud's capabilities for monitoring connections. Telemetry (Option C) involves the collection of data and metrics but does not specifically provide a graphical view of connections. Host Insight (Option E) focuses on providing visibility into host-related activities and vulnerabilities but does not specifically deal with monitoring network connections in the graphical manner described.

Which two fields are required to configure SSO in Prisma Cloud? (Choose two.)

A.
Prisma Cloud Access SAML URL
A.
Prisma Cloud Access SAML URL
Answers
B.
Identity Provider Issuer
B.
Identity Provider Issuer
Answers
C.
Certificate
C.
Certificate
Answers
D.
Identity Provider Logout URL
D.
Identity Provider Logout URL
Answers
Suggested answer: B, C

Explanation:

Configuring Single Sign-On (SSO) in Prisma Cloud requires the Identity Provider Issuer (Option B) and Certificate (Option C). The Identity Provider Issuer is a unique identifier for the SSO identity provider and is used by Prisma Cloud to establish trust and validate SSO responses. The Certificate, typically an X.509 certificate, is used to sign SSO assertions and ensure the security of the SSO communication. The Prisma Cloud Access SAML URL (Option A) is provided by Prisma Cloud to configure the SSO on the identity provider's side, not the other way around. The Identity Provider Logout URL (Option D) is used for single logout configurations but is not a required field for basic SSO configuration in Prisma Cloud.

Which two IDE plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.)

A.
BitBucket
A.
BitBucket
Answers
B.
Visual Studio Code
B.
Visual Studio Code
Answers
C.
CircleCI
C.
CircleCI
Answers
D.
IntelliJ
D.
IntelliJ
Answers
Suggested answer: B, D

Explanation:

Prisma Cloud supports integration with various Integrated Development Environments (IDEs) as part of its DevOps Security offerings, including Visual Studio Code (Option B) and IntelliJ (Option D). These integrations allow developers to scan their Infrastructure as Code (IaC) templates and application code for vulnerabilities and compliance issues directly within their preferred development environments, promoting a 'shift left' security approach. BitBucket (Option A) and CircleCI (Option C) are more commonly associated with Continuous Integration/Continuous Deployment (CI/CD) pipelines rather than being IDEs.

Which two CI/CD plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.).

A.
BitBucket
A.
BitBucket
Answers
B.
Visual Studio Code
B.
Visual Studio Code
Answers
C.
CircleCI
C.
CircleCI
Answers
D.
IntelliJ
D.
IntelliJ
Answers
Suggested answer: A, C

Explanation:

For CI/CD plugins supported by Prisma Cloud as part of its DevOps Security, BitBucket (Option A) and CircleCI (Option C) are the correct choices. BitBucket is widely used for source code management and collaboration, while CircleCI is a popular CI/CD platform. Prisma Cloud integrates with these tools to scan code repositories and CI/CD pipelines for security issues, ensuring that vulnerabilities are identified and addressed early in the development process. Visual Studio Code (Option B) and IntelliJ (Option D) are IDEs rather than CI/CD tools, and while they are supported by Prisma Cloud for scanning and security purposes, they are not considered CI/CD plugins.

Given the following JSON query:

$.resource[*].aws_s3_bucket exists

Which tab is the correct place to add the JSON query when creating a Config policy?

A.
Details
A.
Details
Answers
B.
Compliance Standards
B.
Compliance Standards
Answers
C.
Remediation
C.
Remediation
Answers
D.
Build Your Rule (Run tab)
D.
Build Your Rule (Run tab)
Answers
E.
Build Your Rule (Build tab)
E.
Build Your Rule (Build tab)
Answers
Suggested answer: E

Explanation:

When creating a Config policy in Prisma Cloud and incorporating a JSON query, the correct place to add this query is under the 'Build Your Rule (Build tab)' (Option E). This section allows users to define the criteria and conditions for the policy, including specifying JSON or RQL (Resource Query Language) queries that articulate the policy's logic. The 'Details' (Option A) tab is typically used for general information about the policy, such as its name and description. The 'Compliance Standards' (Option B) tab is for associating the policy with specific compliance frameworks. The 'Remediation' (Option C) tab provides guidance on how to remediate any issues detected by the policy. The 'Build Your Rule (Run tab)' (Option D) is not a standard option in Prisma Cloud policy configuration.

Which two attributes of policies can be fetched using API? (Choose two.)

A.
policy label
A.
policy label
Answers
B.
policy signature
B.
policy signature
Answers
C.
policy mode
C.
policy mode
Answers
D.
policy violation
D.
policy violation
Answers
Suggested answer: A, C

Explanation:

Using the Prisma Cloud API, users can fetch various attributes of policies, including the policy label (Option A) and policy mode (Option C). The policy label helps in categorizing and organizing policies, while the policy mode determines how the policy is enforced (e.g., alert, enforce). The policy signature (Option B) is not a standard attribute exposed via the API for fetching, as it relates more to the internal identification and handling of policies. The policy violation (Option D) is an outcome or event resulting from a policy breach, not an attribute of the policy itself that can be fetched via the API.

Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)

A.
Run the provided curl | bash script from Console to remove Defenders, and then use Cloud Discovery to automatically redeploy Defenders.
A.
Run the provided curl | bash script from Console to remove Defenders, and then use Cloud Discovery to automatically redeploy Defenders.
Answers
B.
Remove Defenders DaemonSet, and then use Cloud Discovery to automatically redeploy the Defenders.
B.
Remove Defenders DaemonSet, and then use Cloud Discovery to automatically redeploy the Defenders.
Answers
C.
Remove Defenders, and then deploy the new DaemonSet so Defenders do not have to automatically update on each deployment.
C.
Remove Defenders, and then deploy the new DaemonSet so Defenders do not have to automatically update on each deployment.
Answers
D.
Let Defenders automatically upgrade.
D.
Let Defenders automatically upgrade.
Answers
Suggested answer: C, D

Explanation:

For upgrading Defenders with a Console v20.04 and Kubernetes deployment, the following two options are viable:

C . Remove Defenders, and then deploy the new DaemonSet: This option involves manually removing the existing Defenders and then deploying a new DaemonSet. This method ensures that the Defenders are updated to the latest version without relying on automatic updates12.

D . Let Defenders automatically upgrade: Prisma Cloud provides the capability for Defenders to automatically upgrade themselves. This feature simplifies the upgrade process by eliminating the need for manual intervention3.

Both methods are supported and can be used depending on the organization's policies and preferences regarding Defender upgrades. The automatic upgrade feature is particularly useful for maintaining up-to-date security without manual oversight, while the manual removal and redeployment of a new DaemonSet can be preferred in environments where more control over the upgrade process is desired123.

Total 260 questions
Go to page: of 26