ExamGecko

Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 20

Question list
Search
Search

Which of the following is not a supported external integration for receiving Prisma Cloud Code Security notifications?

A.
Splunk
A.
Splunk
Answers
B.
Cortex XSOAR
B.
Cortex XSOAR
Answers
C.
Microsoft Teams
C.
Microsoft Teams
Answers
D.
ServiceNow
D.
ServiceNow
Answers
Suggested answer: D

Explanation:

Prisma Cloud enables you to send notifications for new code and CI/CD security issues detected during periodic scans of your environments to messaging systems that you have integrated with Prisma Cloud. Supported messaging systems include Microsoft Teams, Slack, Splunk, JIRA, ServiceNow notification systems, as well as for webhooks.

https://docs.prismacloud.io/en/classic/appsec-admin-guide/get-started/finetune-configuration-settings/enable-notifications

How is the scope of each rule determined in the Prisma Cloud Compute host runtime policy?

A.
By the collection assigned to that rule
A.
By the collection assigned to that rule
Answers
B.
By the target workload
B.
By the target workload
Answers
C.
By the order in which it is created
C.
By the order in which it is created
Answers
D.
By the type of network traffic it controls
D.
By the type of network traffic it controls
Answers
Suggested answer: A

Explanation:

In Prisma Cloud Compute, the scope of each rule within the host runtime policy is determined by the collection assigned to that rule. Collections in Prisma Cloud are logical groupings of resources, such as hosts, containers, or cloud accounts, that share common attributes or security requirements. By associating a rule with a specific collection, administrators can precisely define the context and applicability of the rule, ensuring that the runtime protection mechanisms are accurately targeted and effective. This approach enables granular control over security policies, allowing for tailored security measures that reflect the unique characteristics and needs of different resource groups within the multicloud environment.

A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?

A.
They can deploy any type of container defender to scan this registry.
A.
They can deploy any type of container defender to scan this registry.
Answers
B.
There are Windows host defenders deployed in your environment already.
B.
There are Windows host defenders deployed in your environment already.
Answers
C.
There are Windows host defenders deployed in your environment already. Therefore, they do not need to deploy any additional defenders.
C.
There are Windows host defenders deployed in your environment already. Therefore, they do not need to deploy any additional defenders.
Answers
D.
A defender is not required to configure this type of registry scan.
D.
A defender is not required to configure this type of registry scan.
Answers
Suggested answer: B

Explanation:

When enabling Registry Scanning in Prisma Cloud for a registry that stores Windows images, it's important to note that Windows host defenders must be deployed in the environment to scan these images effectively. The Windows host defenders are specialized versions of the Prisma Cloud Defender that are designed to run on Windows operating systems. They provide the necessary functionality to scan Windows container images stored in registries, identifying vulnerabilities and ensuring the images comply with security policies before they are deployed. This requirement underscores the importance of having the appropriate Defender deployments that match the operating systems of the images being scanned.

Which RQL query will help create a custom identity and access management (1AM) policy to alert on Lambda functions that have permission to terminate EC2 instances?

A.
iam from cloud.resource where dest.cloud.type = 'AWS' AND source.cloud.service.name = 'lambda' AND source.cloud.resource.type = 'function' AND dest.cloud.service.name = 'ec2' AND action.name = 'ec2:TerminateInstances'
A.
iam from cloud.resource where dest.cloud.type = 'AWS' AND source.cloud.service.name = 'lambda' AND source.cloud.resource.type = 'function' AND dest.cloud.service.name = 'ec2' AND action.name = 'ec2:TerminateInstances'
Answers
B.
config from iam where dest.cloud.type = 'AWS' AND source.cloud.service.name = 'ec2' AND source.cloud.resource.type = 'instance' AND dest.cloud.service.name = 'lambda' AND action.name = 'ec2:TerminateInstances'
B.
config from iam where dest.cloud.type = 'AWS' AND source.cloud.service.name = 'ec2' AND source.cloud.resource.type = 'instance' AND dest.cloud.service.name = 'lambda' AND action.name = 'ec2:TerminateInstances'
Answers
C.
iam from cloud.resource where cloud.type equals 'AWS' AND cloud.resource.type equals 'lambda function' AND cloud.service.name = 'ec2' AND action.name equals 'ec2:TerminateInstances'
C.
iam from cloud.resource where cloud.type equals 'AWS' AND cloud.resource.type equals 'lambda function' AND cloud.service.name = 'ec2' AND action.name equals 'ec2:TerminateInstances'
Answers
D.
config from iam where dest.cloud.type = 'AWS' AND source.cloud.service.name = 'lambda' AND source.cloud.resource.type = 'function' AND dest.cloud.service.name = 'ec2' AND action.name = 'ec2:TerminateInstances'
D.
config from iam where dest.cloud.type = 'AWS' AND source.cloud.service.name = 'lambda' AND source.cloud.resource.type = 'function' AND dest.cloud.service.name = 'ec2' AND action.name = 'ec2:TerminateInstances'
Answers
Suggested answer: D

In which Console menu would an administrator verify whether a custom compliance check is failing or passing?

A.
Monitor > Compliance
A.
Monitor > Compliance
Answers
B.
Container Security > Compliance
B.
Container Security > Compliance
Answers
C.
Defend > Compliance
C.
Defend > Compliance
Answers
D.
Custom > Compliance
D.
Custom > Compliance
Answers
Suggested answer: A

Explanation:

In Prisma Cloud, the 'Monitor > Compliance' menu is the centralized location where administrators can verify the status of custom compliance checks, along with predefined compliance standards and frameworks. This section provides a comprehensive view of the organization's compliance posture, displaying whether specific compliance checks are passing or failing. It allows for detailed insights into compliance status across cloud environments, helping administrators identify areas of non-compliance, understand the reasons behind compliance failures, and take corrective actions to address any identified issues.

Which two frequency options are available to create a compliance report within the console? (Choose two.)

A.
One-time
A.
One-time
Answers
B.
Monthly
B.
Monthly
Answers
C.
Recurring
C.
Recurring
Answers
D.
Weekly
D.
Weekly
Answers
Suggested answer: A, D

Explanation:

Within Prisma Cloud, when creating compliance reports, administrators have the flexibility to schedule the generation of these reports based on their specific needs. The available frequency options include 'One-time,' where a report is generated once at a specified time, and 'Weekly,' which allows for the recurring generation of reports on a weekly basis. These options provide organizations with the ability to tailor their compliance reporting to their operational requirements, ensuring that they have regular and up-to-date insights into their compliance posture.

Which Prisma Cloud policy type detects port scanning activities in a customer environment?

A.
Port Scan
A.
Port Scan
Answers
B.
Anomaly
B.
Anomaly
Answers
C.
Config
C.
Config
Answers
D.
Network
D.
Network
Answers
Suggested answer: B

Explanation:

In the context of Prisma Cloud, the policy type that is specifically designed to detect unusual activities, such as port scanning, within a customer's environment is classified under 'Anomaly.' Anomaly-based policies leverage advanced analytics and machine learning algorithms to identify patterns and behaviors that deviate from the norm, which could indicate potential security threats like port scanning attempts. By detecting such anomalies, these policies help organizations proactively identify and respond to potential reconnaissance activities by attackers seeking to discover open ports and vulnerable services.

In Azure, what permissions need to be added to Management Groups to allow Prisma Cloud to calculate net effective permissions?

A.
Microsoft.Management/managementGroups/descendants/read
A.
Microsoft.Management/managementGroups/descendants/read
Answers
B.
Microsoft.Management/managementGroups/descendants/calculate
B.
Microsoft.Management/managementGroups/descendants/calculate
Answers
C.
PaloAltoNetworks.PrismaCloud/managementGroups/descendants/read
C.
PaloAltoNetworks.PrismaCloud/managementGroups/descendants/read
Answers
D.
PaloAltoNetworks.PrismaCloud/managementGroups/
D.
PaloAltoNetworks.PrismaCloud/managementGroups/
Answers
Suggested answer: A

Explanation:

In Azure, to enable Prisma Cloud to calculate net effective permissions across Management Groups, the necessary permission is 'Microsoft.Management/managementGroups/descendants/read.' This permission grants Prisma Cloud the ability to read the management group hierarchy and the related details, allowing for a comprehensive analysis of the effective permissions applied across different levels of the management group structure. By having this level of access, Prisma Cloud can accurately assess and report on the permissions assigned to various resources and identities within the Azure environment, facilitating better security and compliance management.

What is the purpose of Incident Explorer in Prisma Cloud Compute under the 'Monitor' section?

A.
To sort through large amounts of audit data manually in order to identify developing attacks
A.
To sort through large amounts of audit data manually in order to identify developing attacks
Answers
B.
To store large amounts of forensic data on the host where Console runs to enable a more rapid and effective response to incidents
B.
To store large amounts of forensic data on the host where Console runs to enable a more rapid and effective response to incidents
Answers
C.
To correlate individual events to identify potential attacks and provide a sequence of process, file system, and network events for a comprehensive view of an incident
C.
To correlate individual events to identify potential attacks and provide a sequence of process, file system, and network events for a comprehensive view of an incident
Answers
D.
To identify and suppress all audit events generated by the defender
D.
To identify and suppress all audit events generated by the defender
Answers
Suggested answer: C

Explanation:

The purpose of Incident Explorer in Prisma Cloud Compute under the 'Monitor' section is to provide a comprehensive view of incidents by correlating individual events. This helps identify potential attacks through a sequence of processes, file system, and network events, thereby giving a complete picture of an incident's timeline and impact.

https://docs.prismacloud.io/en/classic/compute-admin-guide/runtime-defense/incident-explorer

Which RQL will trigger the following audit event activity?

A.
event from cloud.audit_logs where operation ConsoleLogin AND user = 'root'
A.
event from cloud.audit_logs where operation ConsoleLogin AND user = 'root'
Answers
B.
event from cloud.audit_logs where operation IN ('cloudsql.instances.update','cloudsql.sslCerts.create', cloudsql.instances.create','cloudsq
B.
event from cloud.audit_logs where operation IN ('cloudsql.instances.update','cloudsql.sslCerts.create', cloudsql.instances.create','cloudsq
Answers
C.
event from cloud.audit_logs where cloud.service = s3.amazonaws.com' AND json.rule = $.userAgent contains 'parrot1
C.
event from cloud.audit_logs where cloud.service = s3.amazonaws.com' AND json.rule = $.userAgent contains 'parrot1
Answers
D.
event from cloud.audit_logs where operation IN ( 'GetBucketWebsite', 'PutBucketWebsite', 'DeleteBucketWebsite')
D.
event from cloud.audit_logs where operation IN ( 'GetBucketWebsite', 'PutBucketWebsite', 'DeleteBucketWebsite')
Answers
Suggested answer: A

Explanation:

The correct RQL to trigger the audit event activity shown is Option A. This RQL is designed to capture events from cloud audit logs where a ConsoleLogin operation occurs by the 'root' user. The given audit event details match this RQL's criteria, which specifies the operation type and the user involved in the event.

Total 260 questions
Go to page: of 26