ExamGecko

Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 21

Question list
Search
Search

Prisma Cloud cannot integrate which of the following secrets managers?

A.
IBM Secret Manager
A.
IBM Secret Manager
Answers
B.
AzureKey Vault
B.
AzureKey Vault
Answers
C.
HashiCorp Vault
C.
HashiCorp Vault
Answers
D.
AWS Secret Manager
D.
AWS Secret Manager
Answers
Suggested answer: A

Explanation:

Prisma Cloud integrates with various secret managers to manage sensitive information such as passwords, tokens, and keys. However, it cannot integrate with IBM Secret Manager. The other options, Azure Key Vault, HashiCorp Vault, and AWS Secret Manager, are supported for integration with Prisma Cloud, providing secure storage and handling of secrets.

On which cloud service providers can new API release information for Prisma Cloud be received?

A.
AWS. Azure. GCP. Oracle, IBM
A.
AWS. Azure. GCP. Oracle, IBM
Answers
B.
AWS. Azure. GCP, IBM, Alibaba
B.
AWS. Azure. GCP, IBM, Alibaba
Answers
C.
AWS. Azure. GCP. Oracle, Alibaba
C.
AWS. Azure. GCP. Oracle, Alibaba
Answers
D.
AWS. Azure. GCP, IBM
D.
AWS. Azure. GCP, IBM
Answers
Suggested answer: C

Explanation:

Based on the information available in the provided documents, specifically from the 'code-to-cloud-intelligence (1).pdf', Prisma Cloud by Palo Alto Networks offers integration with multiple cloud service providers. While the document does not explicitly mention the ability to receive new API release information for Prisma Cloud, it does list integrations with various cloud service providers such as AWS, Azure, Google Cloud (GCP), Oracle Cloud, and Alibaba Cloud. Therefore, the answer would be C: AWS, Azure, GCP, Oracle, Alibaba.

Which command correctly outputs scan results to stdout in tabular format and writes scan results to a JSON file while still sending the results to Console?

A.
$ twistcli images scan --address --user --password --stdout-tabular --output-file scan-results.json nginx:latest
A.
$ twistcli images scan --address --user --password --stdout-tabular --output-file scan-results.json nginx:latest
Answers
B.
$ twistcli images scan --address --username --password --details --json-output scan-results.json nginx:latest
B.
$ twistcli images scan --address --username --password --details --json-output scan-results.json nginx:latest
Answers
C.
$ twistcli images scan --address --user --password --details --file-output scan-results.json nginx:latest
C.
$ twistcli images scan --address --user --password --details --file-output scan-results.json nginx:latest
Answers
D.
$ twistcli images scan --address --u --p --details --output-file scan-results.json nginx:latest
D.
$ twistcli images scan --address --u --p --details --output-file scan-results.json nginx:latest
Answers
Suggested answer: C

Explanation:

The correct command to output scan results to stdout in tabular format and write scan results to a JSON file while still sending the results to Console is:

$ twistcli images scan \

--address <console_address> \

--user <username> \

--password \

--output-file scan-results.json \

--publish \

nginx:latest

This command uses the --output-file option to write the scan results to a file and the --publish option to send the results to the Console. The --stdout-tabular option is not necessary as by default, twistcli writes scan results to stdout in a human-readable format. The placeholders <console_address>, <username>, and should be replaced with the actual address of the Console, and the user's credentials12.

Please replace the placeholders with your actual Prisma Cloud Console address and credentials to execute the command successfully. If you have any more questions or need further assistance, feel free to ask.

Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).

A.
Spoke Account Mode
A.
Spoke Account Mode
Answers
B.
Hub Account Mode
B.
Hub Account Mode
Answers
C.
Same Account Mode
C.
Same Account Mode
Answers
D.
Main Account Mode
D.
Main Account Mode
Answers
Suggested answer: A, B

Explanation:

Prisma Cloud supports different scanning modes for its agentless scanning feature. Based on the context of cloud environments and typical terminology used in Prisma Cloud documentation, 'Spoke Account Mode' and 'Hub Account Mode' are plausible modes supported for agentless scanning. These modes allow for the extension of scanning capabilities across multiple accounts, with 'Spoke' typically referring to linked accounts and 'Hub' referring to the central account in a hub-and-spoke architecture. Hence, the correct answers are A and B.

What improves product operationalization by adding visibility into feature utilization and missed opportunities?

A.
Adoption Advisor
A.
Adoption Advisor
Answers
B.
Alarm Advisor
B.
Alarm Advisor
Answers
C.
Alert Center
C.
Alert Center
Answers
D.
Alarm Center
D.
Alarm Center
Answers
Suggested answer: A

Explanation:

The Adoption Advisor is a feature within Prisma Cloud that aims to improve product operationalization. It provides visibility into how features are utilized, identifies unused capabilities, and suggests ways to leverage the full potential of the platform. Therefore, Option A: Adoption Advisor is the correct answer.

What is required for Prisma Cloud to successfully execute auto-remediation commands?

A.
Read access to the cloud platform
A.
Read access to the cloud platform
Answers
B.
Write access to the cloud platform
B.
Write access to the cloud platform
Answers
C.
Access to the cloud platform only for Azure
C.
Access to the cloud platform only for Azure
Answers
D.
Prisma Cloud requires no access to the cloud platform
D.
Prisma Cloud requires no access to the cloud platform
Answers
Suggested answer: B

Explanation:

For Prisma Cloud to execute auto-remediation commands, it requires write access to the cloud platform. This is because auto-remediation involves making changes to configurations or settings within the cloud environment to rectify security issues. Thus, the correct answer is B: Write access to the cloud platform.

What is a benefit of the Cloud Discovery feature?

A.
It does not require any specific permissions to be granted before use.
A.
It does not require any specific permissions to be granted before use.
Answers
B.
It helps engineers find all cloud-native services being used only on AWS.
B.
It helps engineers find all cloud-native services being used only on AWS.
Answers
C.
It offers coverage for serverless functions on AWS only.
C.
It offers coverage for serverless functions on AWS only.
Answers
D.
It enables engineers to continuously monitor all accounts and report on the services that are unprotected.
D.
It enables engineers to continuously monitor all accounts and report on the services that are unprotected.
Answers
Suggested answer: D

Explanation:

The Cloud Discovery feature in Prisma Cloud allows engineers to monitor accounts continuously and report on cloud-native services that are unprotected across different cloud service providers. This feature requires specific permissions to access and assess the cloud environment's configuration and security posture. Thus, the correct answer is D: It enables engineers to continuously monitor all accounts and report on the services that are unprotected.

https://docs.prismacloud.io/en/classic/compute-admin-guide/cloud-service-providers/cloud-accounts-discovery-pcee

In Prisma Cloud for Azure Net Effective Permissions Calculation, the following Azure permission levels are supported by which three permissions? (Choose three).

A.
Resources
A.
Resources
Answers
B.
Tenant
B.
Tenant
Answers
C.
Subscription
C.
Subscription
Answers
D.
Resource groups
D.
Resource groups
Answers
E.
Management Group
E.
Management Group
Answers
Suggested answer: A, C, E

Explanation:

https://docs.prismacloud.io/en/classic/cspm-admin-guide/prisma-cloud-iam-security/context-used-to-calculate-effective-permissions

Given the following information, which twistcli command should be run if an administrator were to exec into a running container and scan it from within using an access token for authentication?

* Console is located at https://prisma-console.mydomain.local

* Token is: TOKEN_VALUE

* Report ID is: REPORTJD

* Container image running is: myimage:latest

A.
twistcli images scan --address https://prisma-console.mydomain.local ---token TOKENVALUE ---containerized ---details myimage:latest
A.
twistcli images scan --address https://prisma-console.mydomain.local ---token TOKENVALUE ---containerized ---details myimage:latest
Answers
B.
twistcli images scan ---console-address https://prisma-console.mydomain.local ---auth-token MY_TOKEN ---local-scan ---details myimage:latest
B.
twistcli images scan ---console-address https://prisma-console.mydomain.local ---auth-token MY_TOKEN ---local-scan ---details myimage:latest
Answers
C.
twistcli images scan ---address https://prisma-console.mydomain.local ---token TOKEN_VALUE ---containerized --details REPORT_ID
C.
twistcli images scan ---address https://prisma-console.mydomain.local ---token TOKEN_VALUE ---containerized --details REPORT_ID
Answers
D.
twistcli images scan --console-address https://prisma-console.mydomain.local --auth-token TOKEN_VALUE ---containerized ---vulnerability-details REPORT_ID
D.
twistcli images scan --console-address https://prisma-console.mydomain.local --auth-token TOKEN_VALUE ---containerized ---vulnerability-details REPORT_ID
Answers
Suggested answer: C

Explanation:

The response from Jihe would be correct if this wasn't be run from within the container. In the question, we are running from inside the container, and therefor there is no need to specify an image/tarball. https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/tools/twistcli_scan_image Further down in the documentation linked by Jihe, there is a section that shows the proper syntax when running twistcli from within a container. The example there is almost a perfect copy of this question. Spippolo has the correct response.

$ docker run \

-v /PATH/TO/TWISTCLI_DIR:/tools \

-e TW_TOKEN=<API_TOKEN> \

-e TW_CONSOLE=<COMPUTE_CONSOLE> \

--entrypoint='' \

<IMAGE_NAME> \

/tools/twistcli images scan \

--containerized \

--details \

--address $TW_CONSOLE \

--token $TW_TOKEN \

<REPORT_ID>

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/tools/twistcli_scan_images

Prisma Cloud supports which three external systems that allow the import of vulnerabilities and provide additional context on risks in the cloud? (Choose three.)

A.
Splunk
A.
Splunk
Answers
B.
Qualys
B.
Qualys
Answers
C.
Amazon Inspector
C.
Amazon Inspector
Answers
D.
Amazon GuardDuty
D.
Amazon GuardDuty
Answers
E.
ServiceNow
E.
ServiceNow
Answers
Suggested answer: B, C, D

Explanation:

Similarly, Prisma Cloud integration with external systems such as Amazon GuardDuty, AWS Inspector, Qualys, and Tenable allow you to import vulnerabilities and provide additional context on risks in the cloud. https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/configure-external-integrations-on-prisma-cloud

Total 260 questions
Go to page: of 26