ExamGecko

Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 9

Question list
Search
Search

List of questions

Search

You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant's existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.

Which option shows the steps required during the alert rule creation process to achieve this objective?

A.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select ''select all policies'' checkbox as part of the alert rule Confirm the alert rule
A.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select ''select all policies'' checkbox as part of the alert rule Confirm the alert rule
Answers
B.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select one or more policies checkbox as part of the alert rule Confirm the alert rule
B.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select one or more policies checkbox as part of the alert rule Confirm the alert rule
Answers
C.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select one or more policies as part of the alert rule Add alert notifications Confirm the alert rule
C.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select one or more policies as part of the alert rule Add alert notifications Confirm the alert rule
Answers
D.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select ''select all policies'' checkbox as part of the alert rule Add alert notifications Confirm the alert rule
D.
Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule Select ''select all policies'' checkbox as part of the alert rule Add alert notifications Confirm the alert rule
Answers
Suggested answer: A

Explanation:

To immediately see all alerts associated with a newly onboarded public cloud account based on existing enabled policies, it is essential to assign the account to an account group and then create an alert rule that applies to this account group. By selecting 'select all policies,' the alert rule will trigger alerts for all existing enabled policies without the need to specify individual policies or add alert notifications for downstream applications.

A customer has configured the JIT, and the user created by the process is trying to log in to the Prisma Cloud console. The user encounters the following error message:

What is the reason for the error message?

A.
The attribute name is not set correctly in JIT settings.
A.
The attribute name is not set correctly in JIT settings.
Answers
B.
The user does not exist.
B.
The user does not exist.
Answers
C.
The user entered an incorrect password
C.
The user entered an incorrect password
Answers
D.
The role is not assigned for the user.
D.
The role is not assigned for the user.
Answers
Suggested answer: A

Explanation:

The error message encountered by the user trying to log into the Prisma Cloud console is likely due to an incorrect configuration in the Just-In-Time (JIT) settings, specifically the attribute name used for JIT authentication. This could prevent the user from being recognized correctly by the Prisma Cloud console.

What are the two ways to scope a CI policy for image scanning? (Choose two.)

A.
container name
A.
container name
Answers
B.
image name
B.
image name
Answers
C.
hostname
C.
hostname
Answers
D.
image labels
D.
image labels
Answers
Suggested answer: B, D

Explanation:

In Prisma Cloud, CI policies for image scanning can be scoped based on the image name and image labels. These scoping options allow for targeted scanning of images, ensuring that policies are applied to relevant images based on their identifiers or metadata.

Which policy type in Prisma Cloud can protect against malware?

A.
Data
A.
Data
Answers
B.
Config
B.
Config
Answers
C.
Network
C.
Network
Answers
D.
Event
D.
Event
Answers
Suggested answer: A

Explanation:

The Data policy type in Prisma Cloud is designed to protect against malware by scanning data and files for malicious content. This policy type helps in identifying and mitigating malware threats in the cloud environment.

If you are required to run in an air-gapped environment, which product should you install?

A.
Prisma Cloud Jenkins Plugin
A.
Prisma Cloud Jenkins Plugin
Answers
B.
Prisma Cloud Compute Edition
B.
Prisma Cloud Compute Edition
Answers
C.
Prisma Cloud with self-hosted plugin
C.
Prisma Cloud with self-hosted plugin
Answers
D.
Prisma Cloud Enterprise Edition
D.
Prisma Cloud Enterprise Edition
Answers
Suggested answer: B

Explanation:

Prisma Cloud Compute Edition is the suitable product for air-gapped environments, where there is no direct internet access. This edition can be installed and operated in isolated environments, providing cloud security capabilities without the need for external connectivity.

What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?

A.
1
A.
1
Answers
B.
2
B.
2
Answers
C.
3
C.
3
Answers
D.
4
D.
4
Answers
Suggested answer: B

Explanation:

In Prisma Cloud, a user with a System Admin role can generate a maximum of 2 access keys. These keys are used for API access and automation, enabling secure and controlled interactions with Prisma Cloud's capabilities.

An administrator needs to detect and alert on any activities performed by a root account.

Which policy type should be used?

A.
config-run
A.
config-run
Answers
B.
config-build
B.
config-build
Answers
C.
network
C.
network
Answers
D.
audit event
D.
audit event
Answers
Suggested answer: D

Explanation:

To detect and alert on activities performed by a root account, an audit event policy should be used. An audit event policy is a type of policy that can be used to detect suspicious activities or events that may be related to security threats. This type of policy will allow the administrator to monitor and alert on any activities performed by a root account.

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/prisma-cloud-threat-detection

The correct policy type to use in order to detect and alert on any activities performed by a root account is an 'audit event' policy. An audit event policy is designed to monitor and record a series of chronological events in the order they occur, typically used to track user activities and changes within the system. When a root account performs any actions, an audit event policy will log these events, allowing the administrator to review and potentially set up alerts if suspicious or unauthorized activities are detected. This type of policy is crucial for security and compliance purposes as it helps ensure that all actions performed with root privileges are legitimate and authorized.

Reference to this can be found in most cloud security platforms that offer CSPM (Cloud Security Posture Management) solutions. For example, within Prisma Cloud by Palo Alto Networks, audit events are a part of the Activity Monitoring features, which track user activities and system changes to facilitate investigations into suspicious or unauthorized actions.

One of the resources on the network has triggered an alert for a Default Config policy.

Given the following resource JSON snippet:

Which RQL detected the vulnerability?

A)

B)

C)

D)

A.
Option A
A.
Option A
Answers
B.
Option B
B.
Option B
Answers
C.
Option C
C.
Option C
Answers
D.
Option D
D.
Option D
Answers
Suggested answer: B

Explanation:

The correct RQL (Resource Query Language) that detected the vulnerability is:

config from cloud.resource where cloud.type = 'aws' and api.name = 'aws-iam-get-credential-report' AND json.rule = '(access_key_1_active is true and access_key_1_last_rotated != N/A and DateTime. ageInDays (access_key_1_last_rotated) > 90) or (access_key_2_active is true and access_key_2_last_rotated != N/A and _DateTime. ageInDays (access_key_2_last_rotated) > 90)'

This RQL is designed to check the age of the AWS IAM user's access keys to ensure that they are rotated within a recommended period, typically 90 days. If the access keys have not been rotated within this timeframe, it would be considered a security risk or vulnerability, as old keys may potentially be compromised. By enforcing access key rotation, it minimizes the risk of unauthorized access.

The reference for this type of policy check can be seen in cloud security best practices that advocate for regular rotation of access keys to minimize the potential impact of key compromise. CSPM tools like Prisma Cloud include such checks to automate compliance with these best practices.

A customer has multiple violations in the environment including:

User namespace is enabled

An LDAP server is enabled

SSH root is enabled

Which section of Console should the administrator use to review these findings?

A.
Manage
A.
Manage
Answers
B.
Vulnerabilities
B.
Vulnerabilities
Answers
C.
Radar
C.
Radar
Answers
D.
Compliance
D.
Compliance
Answers
Suggested answer: D

Explanation:

The correct section of the Console that the administrator should use to review findings such as 'User namespace is enabled', 'An LDAP server is enabled', and 'SSH root is enabled' is 'Compliance'.

The 'Compliance' section in CSPM tools like Prisma Cloud provides an overview of the current compliance posture against various regulatory standards and best practices. It can help identify configurations that do not adhere to best practices or that may violate compliance requirements, such as enabling the user namespace, which could be a security risk, or having an LDAP server and SSH root enabled, which may not comply with certain security standards.

Reference to the use of the 'Compliance' section can be found in CSPM documentation, where it details how compliance checks are used to assess the security and configuration of cloud resources against established benchmarks and standards, allowing organizations to maintain compliance and improve their security posture.

A customer has serverless functions that are deployed in multiple clouds.

Which serverless cloud provider is covered be ''overly permissive service access'' compliance check?

A.
Alibaba
A.
Alibaba
Answers
B.
GCP
B.
GCP
Answers
C.
AWS
C.
AWS
Answers
D.
Azure
D.
Azure
Answers
Suggested answer: C

Explanation:

The serverless cloud provider covered by the ''overly permissive service access'' compliance check is AWS (Amazon Web Services). AWS Lambda, which is the serverless computing platform provided by AWS, may have functions that are assigned more permissions than they require to perform their operations, leading to security risks.

In the context of CSPM tools, such as Prisma Cloud, checks for overly permissive service access would typically include examining the policies attached to AWS Lambda functions to ensure that they adhere to the principle of least privilege. Such checks help identify and rectify overly broad permissions that could potentially be exploited by attackers.

The reference for this can be found in AWS best practices for Lambda security, which emphasize the importance of granting minimal privileges necessary for the Lambda function to perform its tasks, thereby reducing the potential attack surface.

Total 260 questions
Go to page: of 26