ExamGecko

Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 8

Question list
Search
Search

List of questions

Search

A customer has a development environment with 50 connected Defenders. A maintenance window is set for Monday to upgrade 30 stand-alone Defenders in the development environment, but there is no maintenance window available until Sunday to upgrade the remaining 20 stand-alone Defenders.

Which recommended action manages this situation?

A.
Go to Manage > Defender > Manage, then click Defenders, and use the Scheduler to choose which Defenders will be automatically upgraded during the maintenance window.
A.
Go to Manage > Defender > Manage, then click Defenders, and use the Scheduler to choose which Defenders will be automatically upgraded during the maintenance window.
Answers
B.
Find a maintenance window that is suitable to upgrade all stand-alone Defenders in the development environment.
B.
Find a maintenance window that is suitable to upgrade all stand-alone Defenders in the development environment.
Answers
C.
Upgrade a subset of the Defenders by clicking the individual Actions > Upgrade button in the row that corresponds to the Defender that should be upgraded during the maintenance window.
C.
Upgrade a subset of the Defenders by clicking the individual Actions > Upgrade button in the row that corresponds to the Defender that should be upgraded during the maintenance window.
Answers
D.
Open a support case with Palo Alto Networks to arrange an automatic upgrade.
D.
Open a support case with Palo Alto Networks to arrange an automatic upgrade.
Answers
Suggested answer: C

Explanation:

Managing Defender upgrades in a Prisma Cloud environment requires careful planning, especially in scenarios where not all Defenders can be upgraded simultaneously due to maintenance window constraints.

Option C: Upgrade a subset of the Defenders by clicking the individual Actions > Upgrade button in the row that corresponds to the Defender that should be upgraded during the maintenance window is the recommended approach in this situation. This option allows administrators to manually select specific Defenders for upgrade within the available maintenance window, providing control over the upgrade process and ensuring that upgrades are aligned with operational requirements and maintenance schedules.

Prisma Cloud Defender Management Documentation: Details the procedures for managing and upgrading Prisma Cloud Defenders, including manual upgrade processes for individual Defenders.

Best Practices for Managing Defender Upgrades: Offers guidelines on effectively planning and executing Defender upgrades, emphasizing the importance of aligning upgrade activities with maintenance windows to minimize disruption to the development environment.

What is an example of an outbound notification within Prisma Cloud?

A.
AWS Inspector
A.
AWS Inspector
Answers
B.
Qualys
B.
Qualys
Answers
C.
Tenable
C.
Tenable
Answers
D.
PagerDuty
D.
PagerDuty
Answers
Suggested answer: D

Explanation:

Outbound notifications in Prisma Cloud refer to the integration with external systems or services for the purpose of alerting or incident management.

Option D: PagerDuty is an example of an outbound notification within Prisma Cloud. PagerDuty is a popular incident response and alerting service that teams use to manage, track, and respond to incidents in real-time. Prisma Cloud's integration with PagerDuty allows organizations to automatically forward alerts from Prisma Cloud to PagerDuty, enabling streamlined incident management and response workflows.

Prisma Cloud Integration Documentation: Provides instructions for integrating Prisma Cloud with various external services, including PagerDuty, to enhance alerting and incident management capabilities.

Incident Management Best Practices: Discusses strategies for effective incident management, highlighting the role of integrations with external alerting services like PagerDuty in improving response times and incident resolution.

A security team has been asked to create a custom policy.

Which two methods can the team use to accomplish this goal? (Choose two.)

A.
add a new policy
A.
add a new policy
Answers
B.
clone an existing policy
B.
clone an existing policy
Answers
C.
disable an out-of-the-box policy
C.
disable an out-of-the-box policy
Answers
D.
edit the query in the out-of-the-box policy
D.
edit the query in the out-of-the-box policy
Answers
Suggested answer: A, B

Explanation:

To create a custom policy within a cloud security platform like Prisma Cloud, security teams have the flexibility to either add a new policy from scratch or clone an existing one to serve as a foundation for customization. Adding a new policy allows for the creation of a completely tailored rule set based on specific security requirements. Cloning an existing policy, on the other hand, provides a quick start by using the structure of an already established policy, which can then be modified to fit particular needs. This approach is beneficial for maintaining consistency with existing policies while addressing unique security scenarios. Disabling an out-of-the-box policy (option C) or editing the query in an out-of-the-box policy (option D) are actions that might be taken to customize policy enforcement but do not equate to the creation of a new custom policy.

The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?

A.
Ensure functions are not overly permissive.
A.
Ensure functions are not overly permissive.
Answers
B.
Ensure host devices are not directly exposed to containers.
B.
Ensure host devices are not directly exposed to containers.
Answers
C.
Ensure images are created with a non-root user.
C.
Ensure images are created with a non-root user.
Answers
D.
Ensure compliant Docker daemon configuration.
D.
Ensure compliant Docker daemon configuration.
Answers
Suggested answer: D

Explanation:

The question focuses on valid host compliance policies within a cloud environment. Among the given options, the most relevant to host compliance is ensuring compliant Docker daemon configuration. Docker daemon configurations are critical for securing the host environment where containers are run. A compliant Docker daemon configuration involves setting security-related options to ensure the Docker engine operates securely. This can include configurations related to TLS for secure communication, logging levels, authorization plugins, and user namespace remapping for isolation.

Ensuring functions are not overly permissive (Option A) and ensuring images are created with a non-root user (Option C) are more directly related to the security best practices for serverless functions and container images, respectively, rather than host-specific compliance checks. Ensuring host devices are not directly exposed to containers (Option B) is also important for security, but it falls under the broader category of container runtime security rather than host-specific compliance.

Thus, the most valid host compliance policy from the given options is to ensure a compliant Docker daemon configuration, as it directly impacts the security posture of the host environment in a containerized infrastructure. This aligns with best practices for securing Docker environments and is a common recommendation in container security guidelines, including those from Docker and cybersecurity frameworks.

Docker Documentation: Security configuration and best practices for Docker engine: https://docs.docker.com/engine/security/

CIS Docker Benchmark: Providing consensus-based best practices for securing Docker environments: https://www.cisecurity.org/benchmark/docker/

A customer has a large environment that needs to upgrade Console without upgrading all Defenders at one time.

What are two prerequisites prior to performing a rolling upgrade of Defenders? (Choose two.)

A.
manual installation of the latest twistcli tool prior to the rolling upgrade
A.
manual installation of the latest twistcli tool prior to the rolling upgrade
Answers
B.
all Defenders set in read-only mode before execution of the rolling upgrade
B.
all Defenders set in read-only mode before execution of the rolling upgrade
Answers
C.
a second location where you can install the Console
C.
a second location where you can install the Console
Answers
D.
additional workload licenses are required to perform the rolling upgrade
D.
additional workload licenses are required to perform the rolling upgrade
Answers
E.
an existing Console at version n-1
E.
an existing Console at version n-1
Answers
Suggested answer: A, E

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/upgrade/upgrade_process_saas After the Console has been upgraded, check and upgrade any of the Defenders that have reached the end of their support lifecycle (Defenders are backward compatible for N-2 releases). The Defender release image is built from the UBI8-minimal base image and on upgrade it is a full container image upgrade, which means that the old Defender container is replaced with a new container. Then, upgrade all other Prisma Cloud components, such as the Jenkins plugin.

An administrator sees that a runtime audit has been generated for a Container. The audit message is ''DNS resolution of suspicious name wikipedia.com. type A''.

Why would this message appear as an audit?

A.
The DNS was not learned as part of the Container model or added to the DNS allow list.
A.
The DNS was not learned as part of the Container model or added to the DNS allow list.
Answers
B.
This is a DNS known to be a source of malware.
B.
This is a DNS known to be a source of malware.
Answers
C.
The process calling out to this domain was not part of the Container model.
C.
The process calling out to this domain was not part of the Container model.
Answers
D.
The Layer7 firewall detected this as anomalous behavior.
D.
The Layer7 firewall detected this as anomalous behavior.
Answers
Suggested answer: A

Explanation:

The runtime audit message indicating 'DNS resolution of suspicious name wikipedia.com. type A' would appear as an audit because the DNS was not learned as part of the Container model or added to the DNS allow list (option A). In cloud security platforms like Prisma Cloud, runtime protection policies monitor the behavior of running containers and compare it against a learned model of expected behavior. If a container attempts to resolve a DNS name that was not observed during the learning phase or specifically allowed, it triggers an audit event to alert security teams of potentially malicious activity.

Which ''kind'' of Kubernetes object is configured to ensure that Defender is acting as the admission controller?

A.
MutatingWebhookConfiguration
A.
MutatingWebhookConfiguration
Answers
B.
DestinationRules
B.
DestinationRules
Answers
C.
ValidatingWebhookConfiguration
C.
ValidatingWebhookConfiguration
Answers
D.
PodSecurityPolicies
D.
PodSecurityPolicies
Answers
Suggested answer: C

Explanation:

In the context of Kubernetes, an admission controller is a piece of code that intercepts requests to the Kubernetes API server before the persistence of the object, but after the request is authenticated and authorized. The admission controller lets you apply complex validation and policy controls to objects before they are created or updated.

The ValidatingWebhookConfiguration is a Kubernetes object that tells the API server to send an admission validation request to a service (the admission webhook) when a request to create, update, or delete a Kubernetes object matches the rules defined in the configuration. The webhook can then approve or deny the request based on custom logic.

The MutatingWebhookConfiguration is similar but is used to modify objects before they are created or updated, which is not the primary function of an admission controller acting in a protective or validating capacity.

DestinationRules are related to Istio service mesh and are not relevant to Kubernetes admission control.

PodSecurityPolicies (PSPs) are a type of admission controller in Kubernetes but they are predefined by Kubernetes and do not require a specific configuration object like ValidatingWebhookConfiguration. PSPs are also deprecated in recent versions of Kubernetes.

Therefore, the correct answer is C. ValidatingWebhookConfiguration, as it is the Kubernetes object used to configure admission webhooks for validating requests, which aligns with the role of Defender acting as an admission controller in Prisma Cloud.

Reference from the provided documents:

The documents uploaded do not contain specific details about Kubernetes objects or Prisma Cloud's integration with Kubernetes. However, this explanation aligns with general Kubernetes practices and Prisma Cloud's capabilities in securing Kubernetes environments.

Which three options are selectable in a CI policy for image scanning with Jenkins or twistcli? (Choose three.)

A.
Scope - Scans run on a particular host
A.
Scope - Scans run on a particular host
Answers
B.
Credential
B.
Credential
Answers
C.
Apply rule only when vendor fixes are available
C.
Apply rule only when vendor fixes are available
Answers
D.
Failure threshold
D.
Failure threshold
Answers
E.
Grace Period
E.
Grace Period
Answers
Suggested answer: A, C, D

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/continuous_integration/set_policy_ci_plugins

Which component(s), if any, will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?

A.
Defenders
A.
Defenders
Answers
B.
Console
B.
Console
Answers
C.
Jenkins
C.
Jenkins
Answers
D.
twistcli
D.
twistcli
Answers
Suggested answer: B

Explanation:

In Prisma Cloud Enterprise Edition, Palo Alto Networks hosts and runs the Console component. The Console serves as the central management interface for Prisma Cloud, allowing customers to configure policies, view alerts, and manage their cloud security posture without the need to host this component themselves.

Which port should a security team use to pull data from Console's API?

A.
53
A.
53
Answers
B.
25
B.
25
Answers
C.
8084
C.
8084
Answers
D.
8083
D.
8083
Answers
Suggested answer: D

Explanation:

Both Console's API and web interfaces, served on port 8083 (HTTPS), require authentication over a different channel with different credentials (e.g. username and password, access key, and so on), none of which Defender holds. https://docs.paloaltonetworks.com/prisma/prisma-cloud/22-06/prisma-cloud-compute-edition-admin/technology_overviews/defender_architecture

Total 260 questions
Go to page: of 26