ExamGecko
Question list
Search
Search

List of questions

Search

Question 40 - PCCSE discussion

Report
Export

A security team has a requirement to ensure the environment is scanned for vulnerabilities. What are three options for configuring vulnerability policies? (Choose three.)

A.
individual actions based on package type
Answers
A.
individual actions based on package type
B.
output verbosity for blocked requests
Answers
B.
output verbosity for blocked requests
C.
apply policy only when vendor fix is available
Answers
C.
apply policy only when vendor fix is available
D.
individual grace periods for each severity level
Answers
D.
individual grace periods for each severity level
E.
customize message on blocked requests
Answers
E.
customize message on blocked requests
Suggested answer: A, C, D

Explanation:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/vulnerability_management/vuln_management_rules

Configuring vulnerability policies within Prisma Cloud involves several options that cater to different aspects of vulnerability management and policy enforcement. Options A, C, and D are valid configurations for vulnerability policies:

A . Individual actions based on package type allow for tailored responses to vulnerabilities found in specific types of software packages, enabling more granular control over the remediation process.

C . Applying policies only when a vendor fix is available helps prioritize the remediation of vulnerabilities for which a patch or update has been released by the software vendor, ensuring efficient use of resources in addressing the most actionable security issues.

D . Setting individual grace periods for each severity level allows organizations to define different time frames for addressing vulnerabilities based on their severity, enabling a prioritized and risk-based approach to vulnerability management.

These configurations support a comprehensive vulnerability management strategy by allowing customization and prioritization based on the nature of the vulnerability, the availability of fixes, and the risk level associated with each vulnerability.

asked 23/09/2024
Darren Sloan
41 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first