ExamGecko
Home / Palo Alto Networks / PCCSE / List of questions
Ask Question

Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 17

List of questions

Question 161

Report
Export
Collapse

Under which tactic is ''Exploit Public-Facing Application'' categorized in the ATT&CK framework?

Defense Evasion
Defense Evasion
Initial Access
Initial Access
Execution
Execution
Privilege Escalation
Privilege Escalation
Suggested answer: B

Explanation:

In the MITRE ATT&CK framework, the tactic 'Exploit Public-Facing Application' is categorized under Initial Access. This tactic involves leveraging vulnerabilities in public-facing applications to gain unauthorized access to an organization's external services or applications. Initial Access tactics are concerned with the methods adversaries use to gain an initial foothold within a network, and exploiting public-facing applications is a common approach used by attackers to breach external defenses and establish a presence within a target network.

asked 23/09/2024
Carlos Almeida Fernandes
32 questions

Question 162

Report
Export
Collapse

Which alert deposition severity must be chosen to generate low and high severity alerts in the Anomaly settings when user wants to report on an unknown browser and OS, impossible time travel, or both due to account hijacking attempts?

High
High
Aggressive
Aggressive
Moderate
Moderate
Conservative
Conservative
Suggested answer: B

Explanation:

Aggressive: For unusual user activity---Report on either unknown location or service, or both to classify an anomaly. For account hijacking---Report on unknown browser and Operating System, impossible time travel, or both. For anomalous compute provisioning activity---Reports on low and higher severity alerts.

asked 23/09/2024
Enrique Jose Lopez Bolivar
43 questions

Question 163

Report
Export
Collapse

A user from an organization is unable to log in to Prisma Cloud Console after having logged in the previous day.

Which area on the Console will provide input on this issue?

SSO
SSO
Audit Logs
Audit Logs
Users & Groups
Users & Groups
Access Control
Access Control
Suggested answer: B

Explanation:

In the event a user is unable to log in to the Prisma Cloud Console, Audit Logs serve as a critical area for investigating the issue. Audit Logs provide a detailed record of activities, including login attempts, within the Prisma Cloud environment. By examining the Audit Logs, administrators can identify failed login attempts, understand the reasons behind login failures (e.g., incorrect credentials, account lockouts, or access policy changes), and take appropriate actions to resolve the login issues, ensuring users can access the console as expected.

asked 23/09/2024
Craig Reid
36 questions

Question 164

Report
Export
Collapse

What happens when a role is deleted in Prisma Cloud?

The access key associated with that role is automatically deleted.
The access key associated with that role is automatically deleted.
Any integrations that use the access key to make calls to Prisma Cloud will stop working.
Any integrations that use the access key to make calls to Prisma Cloud will stop working.
The users associated with that role will be deleted.
The users associated with that role will be deleted.
Any user who uses that key will be deleted.
Any user who uses that key will be deleted.
Suggested answer: A

Explanation:

When you create an access key, the key is tied to the role with which you logged in and if you delete the role, the access key is automatically deleted. https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-cloud-administrators/create-access-keys

asked 23/09/2024
Jonas Weimar
45 questions

Question 165

Report
Export
Collapse

What is the default namespace created by Defender DaemonSet during deployment?

Redlock
Redlock
Defender
Defender
Twistlock
Twistlock
Default
Default
Suggested answer: C

Explanation:

the default when using the script is twistlock, but you can use whatever you want. https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/configure/set_diff_paths_daemon_sets

asked 23/09/2024
Misael E
37 questions

Question 166

Report
Export
Collapse

Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)

DoS Protection
DoS Protection
Local file inclusion
Local file inclusion
SQL injection
SQL injection
Suspicious binary
Suspicious binary
Shellshock
Shellshock
Suggested answer: B, C, E

Explanation:

In the Prisma Cloud Web-Application and API Security (WAAS) rules, protections against OWASP-recognized vulnerabilities like Local file inclusion, SQL injection, and Shellshock are included. Local file inclusion involves unauthorized access to files on the server, potentially leading to sensitive information disclosure. SQL injection targets data-driven applications by inserting malicious SQL statements into an entry field, while Shellshock exploits vulnerabilities in Bash, a widely used Unix shell, to execute arbitrary commands. These protections are part of Prisma Cloud's comprehensive approach to securing web applications and APIs against common and severe vulnerabilities.

https://www.paloaltonetworks.com/content/dam/pan/en_US/images/prisma/owasp-top-10-protection-2.png?imwidth=3840 OWASP Top-10 Coverage - Protection against most critical security risks to web applications, including injection flaws, broken authentication, broken access control, security misconfigurations, etc.

asked 23/09/2024
Chuck Crouse
49 questions

Question 167

Report
Export
Collapse

Which of the following is displayed in the asset inventory?

EC2 instances
EC2 instances
Asset tags
Asset tags
SSO users
SSO users
Federated users
Federated users
Suggested answer: A

Explanation:

The asset inventory in cloud security platforms like Prisma Cloud typically displays a wide range of cloud resources, including EC2 instances. EC2 instances are virtual servers in Amazon's Elastic Compute Cloud (EC2) for running applications on the Amazon Web Services (AWS) infrastructure. The asset inventory provides visibility into these instances, allowing security teams to monitor their configuration, security posture, and compliance status. This visibility is crucial for identifying misconfigurations, vulnerabilities, and ensuring that all EC2 instances adhere to the organization's security policies and compliance requirements.

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-dashboards/asset-inventory

asked 23/09/2024
Noor Amy
35 questions

Question 168

Report
Export
Collapse

What is the frequency to create a compliance report? (Choose two.)

Weekly
Weekly
One time
One time
Monthly
Monthly
Recurring
Recurring
Suggested answer: B, D

Explanation:

In Prisma Cloud, compliance reports can be generated on a one-time basis or on a recurring schedule. The option for a one-time report allows users to generate a specific report instantly based on the current state of the environment. The recurring option enables users to set up automatic generation of reports at regular intervals, such as weekly or monthly, to track compliance over time. This functionality ensures continuous compliance monitoring and helps in maintaining security standards across cloud resources.

asked 23/09/2024
Marcin Piotrowski
40 questions

Question 169

Report
Export
Collapse

When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?

2
2
4
4
1
1
3
3
Suggested answer: C

Explanation:

Prisma Cloud supports configuring Single Sign-On (SSO) with Identity Providers (IdPs) to streamline user authentication processes. However, for all the cloud accounts monitored by Prisma Cloud, only one IdP provider can be enabled at any given time. This limitation ensures a unified authentication mechanism across the platform, reducing complexity and potential security risks associated with managing multiple IdP configurations.

asked 23/09/2024
Loyiso Gawula
35 questions

Question 170

Report
Export
Collapse

Which two services require external notifications to be enabled for policy violations in the Prisma Cloud environment? (Choose two.)

Splunk
Splunk
QROC
QROC
SQS
SQS
Email
Email
Suggested answer: A, C

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/configure-external-integrations-on-prisma-cloud#id24911ff9-c9ec-4503-bb3a-6cfce792a70d

asked 23/09/2024
daniel valdera carrasco
42 questions
Total 260 questions
Go to page: of 26

Related questions