ExamGecko

Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 22

Question list
Search
Search

Which policy type should be used to detect and alert on cryptominer network activity?

A.
Audit event
A.
Audit event
Answers
B.
Anomaly
B.
Anomaly
Answers
C.
Config-build
C.
Config-build
Answers
D.
Config-run
D.
Config-run
Answers
Suggested answer: B

Explanation:

To detect and alert on cryptominer network activity, the policy type that should be used is an Anomaly policy. Anomaly policies in Prisma Cloud are designed to identify unusual and potentially malicious activities, including the network patterns typical of cryptomining operations. These policies leverage behavioral analytics to spot deviations from normal operations, making Option B the correct answer.

Suspicious network actors---Exposes suspicious connections by inspecting the network traffic to and from your cloud environment and correlating it with AutoFocus, Palo Alto Networks threat intelligence feed. AutoFocus identifies IP addresses involved in suspicious or malicious activity and classifies them into one of eighteen categories. Some examples of the categories are Backdoor, Botnet, Cryptominer, DDoS, Ransomware, Rootkit, and Worm. There are thirty-six policies, two for each of the eighteen categories---internal and external. https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/anomaly-policies

Which three AWS policy types and identities are used to calculate the net effective permissions? (Choose three).

A.
AWS service control policies (SCPs)
A.
AWS service control policies (SCPs)
Answers
B.
AWS IAM group
B.
AWS IAM group
Answers
C.
AWS IAM role
C.
AWS IAM role
Answers
D.
AWS IAM User
D.
AWS IAM User
Answers
E.
AWS IAM tag policy
E.
AWS IAM tag policy
Answers
Suggested answer: A, B, C

Explanation:

In AWS, the net effective permissions are calculated based on various policy types and identities. The correct choices are:

A . AWS service control policies (SCPs): SCPs are used in AWS Organizations to manage permissions for all accounts within the organization, affecting the net effective permissions.

B . AWS IAM group: IAM groups define a set of permissions for a collection of users, influencing their effective permissions.

C . AWS IAM role: IAM roles provide temporary security credentials to assume a set of permissions, impacting the net effective permissions. Option D (AWS IAM User) and E (AWS IAM tag policy) also play roles in defining permissions, but A, B, and C are the primary types used in calculating net effective permissions, making them the correct choices.

Which three platforms support the twistcli tool? (Choose three.)

A.
Linux
A.
Linux
Answers
B.
Windows
B.
Windows
Answers
C.
Android
C.
Android
Answers
D.
MacOS
D.
MacOS
Answers
E.
Solaris
E.
Solaris
Answers
Suggested answer: A, B, D

Explanation:

The twistcli tool, part of Prisma Cloud's suite of security tools, supports various platforms for security scanning and configuration. The correct platforms supported by twistcli include:

A . Linux: twistcli is widely used on Linux platforms for scanning container images, host vulnerabilities, and more, making it a correct choice.

B . Windows: twistcli supports Windows, allowing users to perform security scans and checks on Windows-based systems, making it a correct choice.

D . MacOS: twistcli is also compatible with MacOS, enabling security operations on Apple's operating system, making it a correct choice. Option C (Android) and E (Solaris) are not supported platforms for the twistcli tool, according to the available documentation on Prisma Cloud.

Which policy type provides information about connections from suspicious IPs in a customer database?

A.
Anomaly
A.
Anomaly
Answers
B.
Threat detection
B.
Threat detection
Answers
C.
Network
C.
Network
Answers
D.
AutoFocus
D.
AutoFocus
Answers
Suggested answer: A

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/anomaly-policies

AnAnomalypolicy in Prisma Cloud is designed to provide information about connections from suspicious IPs in a customer database. Anomaly policies are used to detect and alert on unusual activities that deviate from the norm, which can include traffic from known malicious or suspicious IP addresses. These policies help in identifying potential security threats by monitoring for activities that are out of the ordinary, such as unexpected access to a database from an IP address that has not been seen before or is known to be associated with malicious activities.

The documentation link you provided offers detailed guidance on how to configure and manage anomaly policies in Prisma Cloud, ensuring that users can effectively monitor their environments for potential security incidents.

A customer wants to monitor its Amazon Web Services (AWS) accounts via Prisma Cloud, but only needs the resource configuration to be monitored at present.

Which two pieces of information are needed to onboard this account? (Choose two.)

A.
External ID
A.
External ID
Answers
B.
CloudTrail
B.
CloudTrail
Answers
C.
Active Directory ID
C.
Active Directory ID
Answers
D.
RoleARN
D.
RoleARN
Answers
Suggested answer: A, D

Explanation:

To onboard an AWS account for monitoring by Prisma Cloud, specifically for resource configuration monitoring, the required pieces of information include:

A . External ID: The External ID is a unique identifier used in the trust relationship between Prisma Cloud and the AWS account, ensuring secure access, making it a correct choice.

D . RoleARN: The Role Amazon Resource Name (RoleARN) is necessary to grant Prisma Cloud the required permissions to access and monitor the AWS account resources, making it a correct choice. Option B (CloudTrail) is related to AWS logging but is not required solely for onboarding. Option C (Active Directory ID) is not relevant to AWS account onboarding for Prisma Cloud.

A container and image compliance rule has been configured by enabling all checks; however, upon review, the container's compliance view reveals only the entries in the image below.

What is the appropriate action to take next?

A.
Deploy defenders to scan complete container compliance.
A.
Deploy defenders to scan complete container compliance.
Answers
B.
Wait until Prisma Cloud finishes the compliance scan and recheck.
B.
Wait until Prisma Cloud finishes the compliance scan and recheck.
Answers
C.
Change the rule options to list both failed and passed checks in the compliance rule edit window.
C.
Change the rule options to list both failed and passed checks in the compliance rule edit window.
Answers
D.
Change the rule options to list only failed checks in the compliance rule edit window.
D.
Change the rule options to list only failed checks in the compliance rule edit window.
Answers
Suggested answer: C

Explanation:

The image provided showcases a filtered compliance view, which is displaying only certain checks with varying severities and descriptions related to container and image compliance. Since the compliance rule was configured to enable all checks but only a subset of entries is visible, it implies that the current view is filtered to show specific entries. To obtain a comprehensive view of all checks, including those that have passed, the rule options must be adjusted. By selecting the option to list both failed and passed checks, one can gain complete visibility over the compliance status of the container, ensuring that no aspect of the compliance has been overlooked and that all necessary information is available for review.

What is the primary purpose of Prisma Cloud Code Security?

A.
To provide a platform for developers to create custom security policies for applications
A.
To provide a platform for developers to create custom security policies for applications
Answers
B.
To triage alerts and incidents in realtime during deployment
B.
To triage alerts and incidents in realtime during deployment
Answers
C.
To address cloud infrastructure misconfigurations in code before they become alerts or incidents
C.
To address cloud infrastructure misconfigurations in code before they become alerts or incidents
Answers
D.
To offer instant feedback on application performance issues and bottlenecks
D.
To offer instant feedback on application performance issues and bottlenecks
Answers
Suggested answer: C

Explanation:

Prisma Cloud Code Security is designed to integrate security into the DevOps process by scanning infrastructure as code (IaC) templates and configurations for potential security issues. This proactive approach allows developers and security teams to address misconfigurations and vulnerabilities in the code itself, before they are deployed into the cloud environment and become more challenging to resolve. By identifying and rectifying these issues early in the development lifecycle, organizations can reduce the risk of alerts and incidents arising from misconfigurations in their cloud infrastructure, leading to a more secure and compliant cloud environment.

A Systems Engineer is the administrator of a self-hosted Prisma Cloud console. They upgraded the console to the latest version. However, after the upgrade, the console does not show all the policies configured. Before they upgraded the console, they created a backup manually and exported it to a local drive. Now they have to install a Prisma Cloud to restore from the backup that they manually created. Which Prisma Cloud version can they can restore with the backup?

A.
Any version of Prisma Cloud Self-Hosted Console
A.
Any version of Prisma Cloud Self-Hosted Console
Answers
B.
Up to N-2 versions of the Prisma Cloud Self-Hosted Console that the backup created
B.
Up to N-2 versions of the Prisma Cloud Self-Hosted Console that the backup created
Answers
C.
The same version of the Prisma Cloud Self-Hosted Console that the backup created
C.
The same version of the Prisma Cloud Self-Hosted Console that the backup created
Answers
D.
The latest version of Prisma Cloud Self-Hosted Console
D.
The latest version of Prisma Cloud Self-Hosted Console
Answers
Suggested answer: C

Explanation:

https://docs.prismacloud.io/en/compute-edition/31/admin-guide/configure/disaster-recovery

In scenarios where a backup is created manually before upgrading a self-hosted console, it is crucial to restore the system using the backup that matches the version of the Prisma Cloud Self-Hosted Console from which it was taken. This ensures compatibility and integrity of the data and configurations. Using a backup with a different version of the console may lead to inconsistencies or loss of information due to potential changes in the software's data structures or features between versions. Therefore, to ensure a successful restoration, the backup must be applied to the same version of the Prisma Cloud Self-Hosted Console that it was created from.

Which ROL query is used to detect certain high-risk activities executed by a root user in AWS?

A.
event from cloud.audit_logs where operation IN ( 'ChangePassword', 'ConsoleLogin', 'DeactivateMFADevice', 'DeleteAccessKey' , 'DeleteAlarms' ) AND user = 'root'
A.
event from cloud.audit_logs where operation IN ( 'ChangePassword', 'ConsoleLogin', 'DeactivateMFADevice', 'DeleteAccessKey' , 'DeleteAlarms' ) AND user = 'root'
Answers
B.
event from cloud.security_logs where operation IN ( 'ChangePassword', 'ConsoleLogin', 'DeactivateMFADevice', 'DeleteAccessKey' , 'DeleteAlarms' ) AND user = 'root'
B.
event from cloud.security_logs where operation IN ( 'ChangePassword', 'ConsoleLogin', 'DeactivateMFADevice', 'DeleteAccessKey' , 'DeleteAlarms' ) AND user = 'root'
Answers
C.
config from cloud.audit_logs where operation IN ( 'ChangePassword', 'ConsoleLogin', 'DeactivateMFADevice', 'DeleteAccessKey', 'DeleteAlarms' ) AND user = 'root'
C.
config from cloud.audit_logs where operation IN ( 'ChangePassword', 'ConsoleLogin', 'DeactivateMFADevice', 'DeleteAccessKey', 'DeleteAlarms' ) AND user = 'root'
Answers
D.
event from cloud.audit_logs where Risk.Level = 'high' AND user = 'root'
D.
event from cloud.audit_logs where Risk.Level = 'high' AND user = 'root'
Answers
Suggested answer: A

Explanation:

https://docs.prismacloud.io/en/classic/rql-reference/rql-reference/event-query/event-query-examples https://docs.prismacloud.io/en/classic/rql-reference/rql-reference/event-query/event-query-examples#idda895fd2-4496-4b31-9766-7d50215dcc18

Which two information types cannot be seen in the data security dashboard? (Choose two).

A.
Bucket owner
A.
Bucket owner
Answers
B.
Object Data Profile by Region
B.
Object Data Profile by Region
Answers
C.
Top Publicly Exposed Objects By Data Profile
C.
Top Publicly Exposed Objects By Data Profile
Answers
D.
Object content
D.
Object content
Answers
E.
Total objects
E.
Total objects
Answers
Suggested answer: A, D

Explanation:

The data security dashboard in Prisma Cloud provides a comprehensive overview of the security posture related to cloud data storage. However, certain information types, such as the identity of the bucket owner and the actual content within an object, are not typically displayed on such dashboards. This is because the dashboard focuses more on aggregated data profiles, exposure levels, and compliance-related information rather than individual ownership details or the specific content of objects, which may require separate detailed analysis or are managed through different security mechanisms.

Total 260 questions
Go to page: of 26