Palo Alto Networks PCCSE Practice Test - Questions Answers, Page 17
List of questions
Question 161
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Under which tactic is ''Exploit Public-Facing Application'' categorized in the ATT&CK framework?
Explanation:
In the MITRE ATT&CK framework, the tactic 'Exploit Public-Facing Application' is categorized under Initial Access. This tactic involves leveraging vulnerabilities in public-facing applications to gain unauthorized access to an organization's external services or applications. Initial Access tactics are concerned with the methods adversaries use to gain an initial foothold within a network, and exploiting public-facing applications is a common approach used by attackers to breach external defenses and establish a presence within a target network.
Question 162
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which alert deposition severity must be chosen to generate low and high severity alerts in the Anomaly settings when user wants to report on an unknown browser and OS, impossible time travel, or both due to account hijacking attempts?
Explanation:
Aggressive: For unusual user activity---Report on either unknown location or service, or both to classify an anomaly. For account hijacking---Report on unknown browser and Operating System, impossible time travel, or both. For anomalous compute provisioning activity---Reports on low and higher severity alerts.
Question 163
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
A user from an organization is unable to log in to Prisma Cloud Console after having logged in the previous day.
Which area on the Console will provide input on this issue?
Explanation:
In the event a user is unable to log in to the Prisma Cloud Console, Audit Logs serve as a critical area for investigating the issue. Audit Logs provide a detailed record of activities, including login attempts, within the Prisma Cloud environment. By examining the Audit Logs, administrators can identify failed login attempts, understand the reasons behind login failures (e.g., incorrect credentials, account lockouts, or access policy changes), and take appropriate actions to resolve the login issues, ensuring users can access the console as expected.
Question 164
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What happens when a role is deleted in Prisma Cloud?
Explanation:
When you create an access key, the key is tied to the role with which you logged in and if you delete the role, the access key is automatically deleted. https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-cloud-administrators/create-access-keys
Question 165
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What is the default namespace created by Defender DaemonSet during deployment?
Explanation:
the default when using the script is twistlock, but you can use whatever you want. https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/configure/set_diff_paths_daemon_sets
Question 166
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)
Explanation:
In the Prisma Cloud Web-Application and API Security (WAAS) rules, protections against OWASP-recognized vulnerabilities like Local file inclusion, SQL injection, and Shellshock are included. Local file inclusion involves unauthorized access to files on the server, potentially leading to sensitive information disclosure. SQL injection targets data-driven applications by inserting malicious SQL statements into an entry field, while Shellshock exploits vulnerabilities in Bash, a widely used Unix shell, to execute arbitrary commands. These protections are part of Prisma Cloud's comprehensive approach to securing web applications and APIs against common and severe vulnerabilities.
https://www.paloaltonetworks.com/content/dam/pan/en_US/images/prisma/owasp-top-10-protection-2.png?imwidth=3840 OWASP Top-10 Coverage - Protection against most critical security risks to web applications, including injection flaws, broken authentication, broken access control, security misconfigurations, etc.
Question 167
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which of the following is displayed in the asset inventory?
Explanation:
The asset inventory in cloud security platforms like Prisma Cloud typically displays a wide range of cloud resources, including EC2 instances. EC2 instances are virtual servers in Amazon's Elastic Compute Cloud (EC2) for running applications on the Amazon Web Services (AWS) infrastructure. The asset inventory provides visibility into these instances, allowing security teams to monitor their configuration, security posture, and compliance status. This visibility is crucial for identifying misconfigurations, vulnerabilities, and ensuring that all EC2 instances adhere to the organization's security policies and compliance requirements.
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-dashboards/asset-inventory
Question 168
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
What is the frequency to create a compliance report? (Choose two.)
Explanation:
In Prisma Cloud, compliance reports can be generated on a one-time basis or on a recurring schedule. The option for a one-time report allows users to generate a specific report instantly based on the current state of the environment. The recurring option enables users to set up automatic generation of reports at regular intervals, such as weekly or monthly, to track compliance over time. This functionality ensures continuous compliance monitoring and helps in maintaining security standards across cloud resources.
Question 169
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
Explanation:
Prisma Cloud supports configuring Single Sign-On (SSO) with Identity Providers (IdPs) to streamline user authentication processes. However, for all the cloud accounts monitored by Prisma Cloud, only one IdP provider can be enabled at any given time. This limitation ensures a unified authentication mechanism across the platform, reducing complexity and potential security risks associated with managing multiple IdP configurations.
Question 170
![Export Export](https://examgecko.com/assets/images/icon-download-24.png)
Which two services require external notifications to be enabled for policy violations in the Prisma Cloud environment? (Choose two.)
Explanation:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/configure-external-integrations-on-prisma-cloud#id24911ff9-c9ec-4503-bb3a-6cfce792a70d
Question