Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 11
List of questions
Question 101
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.
What does the administrator need to configure?
Explanation:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/waas/waas_dos_protection
Question 102
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
Explanation:
An automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks is known as an 'incident'. Incidents provide a consolidated view of related security events, making it easier for administrators to understand the scope and potential impact of an attack, and to take appropriate response actions.
Question 103
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A customer wants to monitor the company's AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now.
Which two pieces of information do you need to onboard this account? (Choose two.)
Explanation:
To onboard an AWS account into Prisma Cloud for the purpose of monitoring resource configurations, the necessary information includes the Role ARN (Amazon Resource Name) and CloudTrail setup. The Role ARN (Option E) is crucial because Prisma Cloud requires permission to access and monitor resources within the AWS account, which is facilitated through an IAM role that Prisma Cloud can assume. This IAM role must have the necessary permissions to access AWS services and resources that Prisma Cloud needs to monitor. CloudTrail (Option A) is essential for auditing and monitoring API calls within the AWS environment, including those related to resource configurations. It provides visibility into user and resource activity by recording API calls made on the account. CloudTrail logs are used by Prisma Cloud to detect changes in resource configurations and ensure compliance with security policies. Subscription ID (Option B) and Active Directory ID (Option C) are more relevant to Azure cloud environments, not AWS. External ID (Option D) is used in a cross-account role trust relationship to prevent the 'confused deputy' problem, but it's not specifically required just to onboard the account for resource configuration monitoring.
Question 104
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
An administrator for Prisma Cloud needs to obtain a graphical view to monitor all connections, including connections across hosts and connections to any configured network objects.
Which setting does the administrator enable or configure to accomplish this task?
Explanation:
To obtain a graphical view to monitor all connections, including those across hosts and to configured network objects within Prisma Cloud, the appropriate feature to enable or configure is the Cloud Native Network Firewall (Option D). Prisma Cloud's Cloud Native Network Firewall provides visibility into network traffic and allows for the monitoring and control of network flows within the cloud environment, effectively enabling administrators to visualize and secure inter-host communications and connections to network objects. ADEM (Option A) and WAAS Analytics (Option B) are not related to Prisma Cloud's capabilities for monitoring connections. Telemetry (Option C) involves the collection of data and metrics but does not specifically provide a graphical view of connections. Host Insight (Option E) focuses on providing visibility into host-related activities and vulnerabilities but does not specifically deal with monitoring network connections in the graphical manner described.
Question 105
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which two fields are required to configure SSO in Prisma Cloud? (Choose two.)
Explanation:
Configuring Single Sign-On (SSO) in Prisma Cloud requires the Identity Provider Issuer (Option B) and Certificate (Option C). The Identity Provider Issuer is a unique identifier for the SSO identity provider and is used by Prisma Cloud to establish trust and validate SSO responses. The Certificate, typically an X.509 certificate, is used to sign SSO assertions and ensure the security of the SSO communication. The Prisma Cloud Access SAML URL (Option A) is provided by Prisma Cloud to configure the SSO on the identity provider's side, not the other way around. The Identity Provider Logout URL (Option D) is used for single logout configurations but is not a required field for basic SSO configuration in Prisma Cloud.
Question 106
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which two IDE plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.)
Explanation:
Prisma Cloud supports integration with various Integrated Development Environments (IDEs) as part of its DevOps Security offerings, including Visual Studio Code (Option B) and IntelliJ (Option D). These integrations allow developers to scan their Infrastructure as Code (IaC) templates and application code for vulnerabilities and compliance issues directly within their preferred development environments, promoting a 'shift left' security approach. BitBucket (Option A) and CircleCI (Option C) are more commonly associated with Continuous Integration/Continuous Deployment (CI/CD) pipelines rather than being IDEs.
Question 107
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which two CI/CD plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.).
Explanation:
For CI/CD plugins supported by Prisma Cloud as part of its DevOps Security, BitBucket (Option A) and CircleCI (Option C) are the correct choices. BitBucket is widely used for source code management and collaboration, while CircleCI is a popular CI/CD platform. Prisma Cloud integrates with these tools to scan code repositories and CI/CD pipelines for security issues, ensuring that vulnerabilities are identified and addressed early in the development process. Visual Studio Code (Option B) and IntelliJ (Option D) are IDEs rather than CI/CD tools, and while they are supported by Prisma Cloud for scanning and security purposes, they are not considered CI/CD plugins.
Question 108
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Given the following JSON query:
$.resource[*].aws_s3_bucket exists
Which tab is the correct place to add the JSON query when creating a Config policy?
Explanation:
When creating a Config policy in Prisma Cloud and incorporating a JSON query, the correct place to add this query is under the 'Build Your Rule (Build tab)' (Option E). This section allows users to define the criteria and conditions for the policy, including specifying JSON or RQL (Resource Query Language) queries that articulate the policy's logic. The 'Details' (Option A) tab is typically used for general information about the policy, such as its name and description. The 'Compliance Standards' (Option B) tab is for associating the policy with specific compliance frameworks. The 'Remediation' (Option C) tab provides guidance on how to remediate any issues detected by the policy. The 'Build Your Rule (Run tab)' (Option D) is not a standard option in Prisma Cloud policy configuration.
Question 109
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which two attributes of policies can be fetched using API? (Choose two.)
Explanation:
Using the Prisma Cloud API, users can fetch various attributes of policies, including the policy label (Option A) and policy mode (Option C). The policy label helps in categorizing and organizing policies, while the policy mode determines how the policy is enforced (e.g., alert, enforce). The policy signature (Option B) is not a standard attribute exposed via the API for fetching, as it relates more to the internal identification and handling of policies. The policy violation (Option D) is an outcome or event resulting from a policy breach, not an attribute of the policy itself that can be fetched via the API.
Question 110
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)
Explanation:
For upgrading Defenders with a Console v20.04 and Kubernetes deployment, the following two options are viable:
C . Remove Defenders, and then deploy the new DaemonSet: This option involves manually removing the existing Defenders and then deploying a new DaemonSet. This method ensures that the Defenders are updated to the latest version without relying on automatic updates12.
D . Let Defenders automatically upgrade: Prisma Cloud provides the capability for Defenders to automatically upgrade themselves. This feature simplifies the upgrade process by eliminating the need for manual intervention3.
Both methods are supported and can be used depending on the organization's policies and preferences regarding Defender upgrades. The automatic upgrade feature is particularly useful for maintaining up-to-date security without manual oversight, while the manual removal and redeployment of a new DaemonSet can be preferred in environments where more control over the upgrade process is desired123.
Question