Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 6

List of questions
Question 51

A customer has Defenders connected to Prisma Cloud Enterprise. The Defenders are deployed as a DaemonSet in OpenShift.
How should the administrator get a report of vulnerabilities on hosts?
To view the vulnerabilities identified on a host, navigating to the 'Monitor > Vulnerabilities > Hosts' section within the Prisma Cloud Console is the correct approach. This section is specifically designed to provide a comprehensive overview of all detected vulnerabilities within the host environment, offering detailed insights into each vulnerability's nature, severity, and potential impact.
This pathway allows users to efficiently assess the security posture of their hosts, prioritize vulnerabilities based on their severity, and take appropriate remediation actions. The 'Hosts' section under 'Vulnerabilities' is tailored to display vulnerabilities related to host configurations, installed software, and other host-level security concerns, making it the ideal location within the Prisma Cloud Console for this purpose.
Question 52

A customer has a requirement to scan serverless functions for vulnerabilities.
Which three settings are required to configure serverless scanning? (Choose three.)
Question 53

You are tasked with configuring a Prisma Cloud build policy for Terraform. What type of query is necessary to complete this policy?
Question 54

You have onboarded a public cloud account into Prisma Cloud Enterprise. Configuration Resource ingestion is visible in the Asset Inventory for the onboarded account, but no alerts are being generated for the configuration assets in the account.
Config policies are enabled in the Prisma Cloud Enterprise tenant, with those policies associated to existing alert rules. ROL statements on the investigate matching those policies return config resource results successfully.
Why are no alerts being generated?
Question 55

The security team wants to target a CNAF policy for specific running Containers. How should the administrator scope the policy to target the Containers?
Question 56

The InfoSec team wants to be notified via email each time a Security Group is misconfigured. Which Prisma Cloud tab should you choose to complete this request?
Question 57

An administrator has access to a Prisma Cloud Enterprise.
What are the steps to deploy a single container Defender on an ec2 node?
Question 58

A customer wants to turn on Auto Remediation.
Which policy type has the built-in CLI command for remediation?
Question 59

A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
Question 60

Which container image scan is constructed correctly?
Question