ExamGecko
Question list
Search
Search

List of questions

Search

Question 14 - PCCSE discussion

Report
Export

A customer does not want alerts to be generated from network traffic that originates from trusted internal networks.

Which setting should you use to meet this customer's request?

A.
Trusted Login IP Addresses
Answers
A.
Trusted Login IP Addresses
B.
Anomaly Trusted List
Answers
B.
Anomaly Trusted List
C.
Trusted Alert IP Addresses
Answers
C.
Trusted Alert IP Addresses
D.
Enterprise Alert Disposition
Answers
D.
Enterprise Alert Disposition
Suggested answer: C

Explanation:

B --> Anomaly Trusted List---Exclude trusted IP addresses when conducting tests for PCI compliance or penetration testing on your network. Any addresses included in this list do not generate alerts against the Prisma Cloud Anomaly Policies that detect unusual network activity such as the policies that detect internal port scan and port sweep activity, which are enabled by default. C --> Trusted Alert IP Addresses---If you have internal networks that connect to your public cloud infrastructure, you can add these IP address ranges (or CIDR blocks) as trusted ... Prisma Cloud default network policies that look for internet exposed instances also do not generate alerts when the source IP address is included in the trusted IP address list and the account hijacking anomaly policy filters out activities from known IP addresses. Also, when you use RQL to query network traffic, you can filter out traffic from known networks that are included in the trusted IP address list.

For a customer who does not want alerts to be generated from network traffic originating from trusted internal networks, the appropriate setting is C. Trusted Alert IP Addresses. This setting allows for specifying certain IP addresses as trusted, meaning alerts will not be triggered by activities from these IPs, ensuring that internal network traffic is not flagged as potentially malicious.

asked 23/09/2024
William Hopson
31 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first