ExamGecko

Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 16

Question list
Search
Search

Which resource and policy type are used to calculate AWS Net Effective Permissions? (Choose two.)

A.
Service Linked Roles
A.
Service Linked Roles
Answers
B.
Lambda Function
B.
Lambda Function
Answers
C.
Amazon Resource Names (ARNs) using Wild Cards
C.
Amazon Resource Names (ARNs) using Wild Cards
Answers
D.
AWS Service Control Policies (SCPs)
D.
AWS Service Control Policies (SCPs)
Answers
Suggested answer: B, D

Explanation:

'The list of AWS policy types and identities that are used to calculate the net effective permissions are as follows:

AWS IAM role

AWS IAM policy

AWS IAM group

AWS service control policies (SCPs)

Role trust relationships

Permission boundaries

NotAction

Policies with wild card support

If your cloud environment has additional resource types, Prisma Cloud does not factor them into the net-effective permissions.

In addition, permissions can also be set by a resource-based policy. The following AWS resource-based policies are supported in the net effective permissions calculation:

Lambda function

S3 bucket

SQS queue

SNS topic

ECS task definition

Secret manager

KMS key

Lambda layer version'

When an alert notification from the alarm center is deleted, how many hours will a similar alarm be suppressed by default?

A.
12
A.
12
Answers
B.
8
B.
8
Answers
C.
24
C.
24
Answers
D.
4
D.
4
Answers
Suggested answer: C

Explanation:

Click Delete if you want to remove the notification from the alarm center. Once deleted, a similar alarm will not appear for the next 24 hours, if the same error occurs in that time period. After 24 hours, a similar error will generate a new alarm notification. https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-cloud-alarms/review-alarms

Which component of a Kubernetes setup can approve, modify, or reject administrative requests?

A.
Kube Controller
A.
Kube Controller
Answers
B.
Terraform Controller
B.
Terraform Controller
Answers
C.
Admission Controller
C.
Admission Controller
Answers
D.
Control plane
D.
Control plane
Answers
Suggested answer: C

Explanation:

In a Kubernetes environment, the Admission Controller is a critical component responsible for approving, modifying, or rejecting administrative requests before they are processed by the Kubernetes API server. The Admission Controller acts as a gatekeeper, enforcing governance and policy controls by evaluating requests against a set of predefined rules and policies. It can validate and mutate requests, ensuring that only compliant and authorized changes are allowed to proceed. This capability is vital for maintaining the security and integrity of the Kubernetes cluster, as it can prevent unauthorized or potentially harmful actions from being executed, thus playing a key role in the cluster's overall security posture.

Which three actions are available for the container image scanning compliance rule? (Choose three.)

A.
Allow
A.
Allow
Answers
B.
Snooze
B.
Snooze
Answers
C.
Block
C.
Block
Answers
D.
Ignore
D.
Ignore
Answers
E.
Alert
E.
Alert
Answers
Suggested answer: C, D, E

Explanation:

The Prisma Cloud documentation specifies the actions that can be taken for container image scanning compliance rules as:

C . Block: This action prevents the use of a container image if it fails to meet the defined compliance criteria.

D . Ignore: This action allows the image to bypass the compliance check, effectively overlooking the identified issues.

E . Alert: This action triggers an alert to notify the relevant stakeholders about the compliance status of the container image.

These actions are integral to Prisma Cloud's governance capabilities, allowing organizations to enforce their security and compliance policies effectively. By setting up these rules, teams can ensure that only images that comply with their standards are deployed, while also having the flexibility to ignore certain images or receive alerts for further investigation.

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/compliance/trusted_images

What will happen when a Prisma Cloud Administrator has configured agentless scanning in an environment that also has Host and Container Defenders deployed?

A.
Agentless scan will automatically be disabled, so Defender scans are the only scans occurring.
A.
Agentless scan will automatically be disabled, so Defender scans are the only scans occurring.
Answers
B.
Agentless scans do not conflict with Defender scans, so both will run.
B.
Agentless scans do not conflict with Defender scans, so both will run.
Answers
C.
Defender scans will automatically be disabled, so agentless scans are the only scans occurring.
C.
Defender scans will automatically be disabled, so agentless scans are the only scans occurring.
Answers
D.
Both agentless and Defender scans will be disabled and an error message will be received.
D.
Both agentless and Defender scans will be disabled and an error message will be received.
Answers
Suggested answer: B

Explanation:

In a Prisma Cloud environment where both agentless scanning and Defender-based scans (Host and Container Defenders) are configured, there is no inherent conflict between these two scanning methods. Both agentless scans and Defender scans are designed to complement each other, providing comprehensive coverage and depth in the security analysis of the environment. Agentless scans offer a broad, less intrusive overview, while Defender scans provide deep, detailed insights into the security posture. Therefore, both types of scans will run concurrently, enhancing the overall security visibility and protection of the environment without disabling or interfering with each other's operations.

The agentless scanning architecture lets you inspect a host and the container images in that host without having to install an agent or affecting its execution. https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/agentless-scanning/onboard-accounts

An administrator of Prisma Cloud wants to enable role-based access control for Docker engine.

Which configuration step is needed first to accomplish this task?

A.
Configure Docker's authentication sequence to first use an identity provider and then Console.
A.
Configure Docker's authentication sequence to first use an identity provider and then Console.
Answers
B.
Set Defender's listener type to TCP.
B.
Set Defender's listener type to TCP.
Answers
C.
Set Docker's listener type to TCP.
C.
Set Docker's listener type to TCP.
Answers
D.
Configure Defender's authentication sequence to first use an identity provider and then Console.
D.
Configure Defender's authentication sequence to first use an identity provider and then Console.
Answers
Suggested answer: B

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/access_control/rbac

Which of the below actions would indicate -- ''The timestamp on the compliance dashboard?

A.
indicates the most recent data
A.
indicates the most recent data
Answers
B.
indicates the most recent alert generated
B.
indicates the most recent alert generated
Answers
C.
indicates when the data was ingested
C.
indicates when the data was ingested
Answers
D.
indicates when the data was aggregated for the results displayed
D.
indicates when the data was aggregated for the results displayed
Answers
Suggested answer: D

Explanation:

The timestamp on the compliance dashboard in a cloud security context typically reflects the point in time when data from various sources is collected, processed, and then consolidated to present the compliance status or results. This aggregation process involves compiling data from multiple scans, logs, and other compliance-related information to provide a comprehensive overview of the current compliance posture. Therefore, the timestamp usually indicates when this aggregation was completed, ensuring that users are viewing the most up-to-date and relevant compliance information based on the latest data compilation.

During the Learning phase of the Container Runtime Model, Prisma Cloud enters a ''dry run'' period for how many hours?

A.
4
A.
4
Answers
B.
48
B.
48
Answers
C.
1
C.
1
Answers
D.
24
D.
24
Answers
Suggested answer: D

Explanation:

Learning mode is the phase in which Prisma Cloud performs either static or dynamic analysis. Because the model depends on behavioral inputs, images stay in learning mode for 1 hour to complete the model. After this 1 hour, Prisma Cloud enters a 'dry run' period for 24 hours to ensure there are no behavioral changes and the model is complete. If during these 24 hours, behavioral changes are observed, the model goes back to Learning mode for an additional 24 hours.

Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)

A.
Crypto miners
A.
Crypto miners
Answers
B.
Brute Force
B.
Brute Force
Answers
C.
Cross-Site Scripting
C.
Cross-Site Scripting
Answers
D.
Port Scanning
D.
Port Scanning
Answers
E.
SQL Injection
E.
SQL Injection
Answers
Suggested answer: A, B, D

Explanation:

This section describes the incident types surfaced in Incident Explorer.

Altered binary

Backdoor admin accounts

Backdoor SSH access

Brute force

Crypto miners

Execution flow hijack attempt

Kubernetes attack

Lateral movement

Malware

Port scanning

Reverse shell

Suspicious binary

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/runtime_defense/incident_types

Which two filters are available in the SecOps dashboard? (Choose two.)

A.
Time range
A.
Time range
Answers
B.
Account Groups
B.
Account Groups
Answers
C.
Service Name
C.
Service Name
Answers
D.
Cloud Region
D.
Cloud Region
Answers
Suggested answer: A, B

Explanation:

In the SecOps dashboard of a cloud security platform like Prisma Cloud, filters such as Time range and Account Groups are essential for narrowing down the data or security alerts based on specific time periods or organizational structures. The Time range filter allows users to view incidents or compliance data for a particular timeframe, facilitating trend analysis and focusing on recent events. The Account Groups filter enables the segregation of data based on different cloud accounts or organizational units, making it easier for security teams to manage and prioritize security tasks according to the business structure or cloud architecture.

Total 260 questions
Go to page: of 26