ExamGecko

Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 15

Question list
Search
Search

Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)

A.
Network flow
A.
Network flow
Answers
B.
Audit
B.
Audit
Answers
C.
Traffic
C.
Traffic
Answers
D.
Users
D.
Users
Answers
Suggested answer: A, B

Explanation:

Anomaly policies in Prisma Cloud utilize Network flow logs (A) and Audit logs (B) to identify unusual network and user activities. Network flow logs provide visibility into the traffic flow across the network, helping detect anomalies in communication patterns that might indicate malicious activities or network misconfigurations. Audit logs record user actions within the system, offering insights into potentially unauthorized or suspicious operations that could compromise security. By analyzing these logs, anomaly policies can effectively pinpoint irregularities that deviate from established baselines, enabling timely detection and response to potential security threats.

What are two alarm types that are registered after alarms are enabled? (Choose two.)

A.
Onboarded Cloud Accounts status
A.
Onboarded Cloud Accounts status
Answers
B.
Resource status
B.
Resource status
Answers
C.
Compute resources
C.
Compute resources
Answers
D.
External integrations status
D.
External integrations status
Answers
Suggested answer: A, D

Explanation:

Upon enabling alarms in Prisma Cloud, two critical alarm types that are registered are Onboarded Cloud Accounts status (A) and External integrations status (D). These alarms are pivotal for maintaining the health and security of the cloud environment. The Onboarded Cloud Accounts status alarms alert administrators about the connectivity and health of cloud accounts integrated with Prisma Cloud, ensuring continuous monitoring and security coverage. The External integrations status alarms provide notifications regarding the operational status of third-party services and tools integrated with Prisma Cloud, such as SIEMs, ticketing systems, or other security tools, ensuring that these integrations function correctly to support comprehensive security and incident response workflows.

What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?

A.
Go to Settings > Data > Snippet Masking and select Full Mask.
A.
Go to Settings > Data > Snippet Masking and select Full Mask.
Answers
B.
Go to Settings > Data > Data Patterns, search for SSN Pattern, edit it, and modify the proximity keywords.
B.
Go to Settings > Data > Data Patterns, search for SSN Pattern, edit it, and modify the proximity keywords.
Answers
C.
Go to Settings > Cloud Accounts > Edit Cloud Account > Assign Account Group and select a group with limited permissions.
C.
Go to Settings > Cloud Accounts > Edit Cloud Account > Assign Account Group and select a group with limited permissions.
Answers
D.
Go to Policies > Data > Clone > Modify Objects containing Financial Information publicly exposed and change the file exposure to Private.
D.
Go to Policies > Data > Clone > Modify Objects containing Financial Information publicly exposed and change the file exposure to Private.
Answers
Suggested answer: A

Explanation:

To ensure that sensitive data such as SSNs and credit card numbers are not visible in Dashboard > Data view during investigations, the correct method is to go to Settings > Data > Snippet Masking and select Full Mask (A). This feature in Prisma Cloud allows administrators to mask sensitive data snippets within the dashboard, ensuring that such information is obfuscated and not exposed to unauthorized viewers. Full Masking provides a robust level of protection by completely hiding the sensitive values, thereby enhancing data privacy and compliance with regulations that mandate the protection of personal and financial information.

Which two integrations enable ingesting host findings to generate alerts? (Choose two.)

A.
Splunk
A.
Splunk
Answers
B.
Tenable
B.
Tenable
Answers
C.
JIRA
C.
JIRA
Answers
D.
Qualys
D.
Qualys
Answers
Suggested answer: B, D

Explanation:

To ingest host findings and generate alerts in Prisma Cloud, integrations with Tenable (B) and Qualys (D) are supported. These integrations allow Prisma Cloud to ingest vulnerability and compliance data from Tenable and Qualys, which are renowned vulnerability management solutions. By integrating these tools, Prisma Cloud can enhance its visibility into the security posture of hosts within the cloud environment, enabling more comprehensive threat detection and response capabilities. The integration facilitates the aggregation and correlation of findings from these external sources, enriching the overall security intelligence and enabling more informed and timely decision-making regarding threat mitigation and compliance management.

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/configure-external-integrations-on-prisma-cloud/integrations-feature-support

Which data storage type is supported by Prisma Cloud Data Security?

A.
IBM Cloud Object Storage
A.
IBM Cloud Object Storage
Answers
B.
AWS S3 buckets
B.
AWS S3 buckets
Answers
C.
Oracle Object Storage
C.
Oracle Object Storage
Answers
D.
Google storage class
D.
Google storage class
Answers
Suggested answer: B

Explanation:

Prisma Cloud Data Security supports various data storage types, including AWS S3 buckets (B). AWS S3 (Simple Storage Service) is a widely used object storage service that offers scalability, data availability, security, and performance. Prisma Cloud's ability to secure S3 buckets is crucial for organizations leveraging AWS for storage needs, as it ensures that data stored within these buckets is protected against unauthorized access, data breaches, and other security threats. Prisma Cloud provides comprehensive visibility into the data stored in S3 buckets, enabling data classification, compliance monitoring, and threat detection to safeguard sensitive data effectively.

Which action must be taken to enable a user to interact programmatically with the Prisma Cloud APIs and for a nonhuman entity to be enabled for the access keys?

A.
Create a role with System Admin and generate access keys.
A.
Create a role with System Admin and generate access keys.
Answers
B.
Create a user with a role that has minimal access.
B.
Create a user with a role that has minimal access.
Answers
C.
Create a role with Account Group Read Only and assign it to the user.
C.
Create a role with Account Group Read Only and assign it to the user.
Answers
D.
Create a role and assign it to the Service Account.
D.
Create a role and assign it to the Service Account.
Answers
Suggested answer: D

Explanation:

To enable a user to interact programmatically with Prisma Cloud APIs and for a nonhuman entity to access keys, the correct action is to create a role and assign it to the Service Account (D). Service accounts in Prisma Cloud are designed for programmatic access by applications or automated tools, allowing these entities to interact with Prisma Cloud APIs securely. By creating a specific role with the necessary permissions and assigning it to a service account, administrators can ensure that the entity has the appropriate level of access required for its operations, aligning with the principle of least privilege and enhancing the security posture of API interactions.

Which three types of runtime rules can be created? (Choose three.)

A.
Processes
A.
Processes
Answers
B.
Network-outgoing
B.
Network-outgoing
Answers
C.
Filesystem
C.
Filesystem
Answers
D.
Kubernetes-audit
D.
Kubernetes-audit
Answers
E.
Waas-request
E.
Waas-request
Answers
Suggested answer: A, B, C

Explanation:

In Prisma Cloud, runtime rules are created to monitor and control the behavior of applications and services during their execution to ensure compliance with security policies. The three types of runtime rules that can be created in Prisma Cloud are:

Processes: These rules monitor and control the execution of processes within the environment. They can be used to detect unauthorized or malicious processes and take actions such as alerting, blocking, or terminating the processes.

Network-outgoing: These rules govern the outbound network connections from the applications or containers. They help in controlling access to external resources, preventing data exfiltration, and ensuring that the communication complies with the security policies.

Filesystem: Filesystem rules are related to the access and modification of the file system by applications or containers. These rules can help in detecting unauthorized access, changes to sensitive files, and ensuring that the applications adhere to the least privilege principle in terms of file access.

These runtime rules are essential for maintaining the security and integrity of applications running in cloud environments, especially in dynamic and distributed architectures where traditional perimeter-based security controls may not be sufficient.

Who can access saved searches in a cloud account?

A.
Administrators
A.
Administrators
Answers
B.
Users who can access the tenant
B.
Users who can access the tenant
Answers
C.
Creators
C.
Creators
Answers
D.
All users with whom the saved search has been shared
D.
All users with whom the saved search has been shared
Answers
Suggested answer: A

Explanation:

Saved Searches has list of search queries saved by any Prisma Cloud administrator.

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-cloud-administrators/prisma-cloud-admin-permissions

According to the official Palo Alto Networks documentation, saved searches in a cloud account are managed by administrators. This aligns with the principle that administrative privileges are typically required to manage access to saved searches and other similar resources within cloud platforms. Administrators have the capability to control who can access various resources, ensuring that only authorized users can view or modify saved searches. This is a common security measure to prevent unauthorized access and potential data breaches.

The Compute Console has recently been upgraded, and the administrator plans to delay upgrading the Defenders and the Twistcli tool until some of the team's resources have been rescaled. The Console is currently one major release ahead.

What will happen as a result of the Console upgrade?

A.
Defenders will disconnect, and Twistcli will stop working.
A.
Defenders will disconnect, and Twistcli will stop working.
Answers
B.
Defenders will disconnect, and Twistcli will remain working.
B.
Defenders will disconnect, and Twistcli will remain working.
Answers
C.
Both Defenders and Twistcli will remain working.
C.
Both Defenders and Twistcli will remain working.
Answers
D.
Defenders will remain connected, and Twistcli will stop working.
D.
Defenders will remain connected, and Twistcli will stop working.
Answers
Suggested answer: C

Explanation:

When the Compute Console in Prisma Cloud is upgraded to a newer major release, while the Defenders and the Twistcli tool remain on the older version, the system is designed to ensure backward compatibility to a certain extent. As a result, both Defenders and Twistcli will continue to operate despite the version discrepancy. The Defenders will remain connected, continuing their monitoring and protection duties, and the Twistcli tool will keep functioning, allowing for continued scanning and other CLI-based operations. This design ensures that the security and functionality of the environment are not abruptly interrupted due to the upgrade process, providing administrators with a window to plan and execute the upgrade of Defenders and Twistcli without immediate pressure.

What are two key requirements for integrating Okta with Prisma Cloud when multiple Amazon Web Services (AWS) cloud accounts are being used? (Choose two.)

A.
Super Administrator permissions
A.
Super Administrator permissions
Answers
B.
A valid subscription for the IAM security module
B.
A valid subscription for the IAM security module
Answers
C.
An Okta API token for the primary AWS account
C.
An Okta API token for the primary AWS account
Answers
D.
Multiple instances of the Okta app
D.
Multiple instances of the Okta app
Answers
Suggested answer: B, D

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-iam-security/integrate-prisma-cloud-with-okta

Total 260 questions
Go to page: of 26