Prisma Certified Cloud Security Engineer v1.0 (PCCSE)

Page:    1 / 17   
Total 248 questions

Which two processes ensure that builds can function after a Console upgrade? (Choose two.)

  • A. allowing Jenkins to automatically update the plugin
  • B. updating any build environments that have twistcli included to use the latest version
  • C. configuring build pipelines to download twistcli at the start of each build
  • D. creating a new policy that allows older versions of twistcli to connect the Console


Answer : AB

The compliance team needs to associate Prisma Cloud policies with compliance frameworks.
Which option should the team select to perform this task?

  • A. Custom Compliance
  • B. Policies
  • C. Compliance
  • D. Alert Rules


Answer : B

Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-compliance/compliance-dashboard.html

Review this admission control policy:
match[{"msg": msg}] {
input.request.operation == "CREATE"
input.request.kind.kind == "Pod"
input.request.resource.resource == "pods"
input.request.object.spec.containers[_].securityContext.privileged msg := "Privileged"
}
Which response to this policy will be achieved when the effect is set to `block`?

  • A. The policy will block all pods on a Privileged host.
  • B. The policy will replace Defender with a privileged Defender.
  • C. The policy will alert only the administrator when a privileged pod is created.
  • D. The policy will block the creation of a privileged pod.


Answer : C

Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts.
Where can the administrator locate this list of e-mail recipients?

  • A. Target section within an Alert Rule.
  • B. Notification Template section within Alerts.
  • C. Users section within Settings.
  • D. Set Alert Notification section within an Alert Rule.


Answer : A

A customer wants to scan a serverless function as part of a build process.
Which twistcli command can be used to scan serverless functions?

  • A. twistcli function scan <SERVERLESS_FUNCTION.ZIP>
  • B. twistcli scan serverless <SERVERLESS_FUNCTION.ZIP>
  • C. twistcli serverless AWS <SERVERLESS_FUNCTION.ZIP>
  • D. twiscli serverless scan <SERVERLESS_FUNCTION.ZIP>


Answer : D

Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/vulnerability_management/serverless_functions

A customer has a development environment with 50 connected Defenders. A maintenance window is set for Monday to upgrade 30 stand-alone Defenders in the development environment, but there is no maintenance window available until Sunday to upgrade the remaining 20 stand-alone Defenders.
Which recommended action manages this situation?

  • A. Go to Manage > Defender > Manage, then click Defenders, and use the Scheduler to choose which Defenders will be automatically upgraded during the maintenance window.
  • B. Find a maintenance window that is suitable to upgrade all stand-alone Defenders in the development environment.
  • C. Upgrade a subset of the Defenders by clicking the individual Actions > Upgrade button in the row that corresponds to the Defender that should be upgraded during the maintenance window.
  • D. Open a support case with Palo Alto Networks to arrange an automatic upgrade.


Answer : A

What is an example of an outbound notification within Prisma Cloud?

  • A. AWS Inspector
  • B. Qualys
  • C. Tenable
  • D. PagerDuty


Answer : D

A security team has been asked to create a custom policy.
Which two methods can the team use to accomplish this goal? (Choose two.)

  • A. add a new policy
  • B. clone an existing policy
  • C. disable an out-of-the-box policy
  • D. edit the query in the out-of-the-box policy


Answer : AB

Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/manage-prisma-cloud-policies

The security auditors need to ensure that given compliance checks are being run on the host.
Which option is a valid host compliance policy?

  • A. Ensure functions are not overly permissive.
  • B. Ensure host devices are not directly exposed to containers.
  • C. Ensure images are created with a non-root user.
  • D. Ensure compliant Docker daemon configuration.


Answer : C

DRAG DROP -
Match the correct scanning mode for each given operation.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
Select and Place:



Answer :

A customer wants to be notified about port scanning network activities in their environment.
Which policy type detects this behavior?

  • A. Network
  • B. Port Scan
  • C. Anomaly
  • D. Config


Answer : A

A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80.
Which port should the team specify in the CNAF rule to protect the application?

  • A. 443
  • B. 80
  • C. 8080
  • D. 8888


Answer : C

Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/19-11/prisma-cloud-compute-edition-admin/firewalls/deploy_cnaf.html

Which three types of buckets exposure are available in the Data Security module? (Choose three.)

  • A. Public
  • B. Private
  • C. International
  • D. Differential
  • E. Conditional


Answer : CDE

The administrator wants to review the Console audit logs from within the Console.
Which page in the Console should the administrator use to review this data, if it can be reviewed at all?

  • A. Navigate to Monitor > Events > Host Log Inspection
  • B. The audit logs can be viewed only externally to the Console
  • C. Navigate to Manage > Defenders > View Logs
  • D. Navigate to Manage > View Logs > History


Answer : D

Reference:
https://docs.twistlock.com/docs/compute_edition/howto/review_debug_logs.html

DRAG DROP -
What is the order of steps in a Jenkins pipeline scan?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Select and Place:



Answer :

Page:    1 / 17   
Total 248 questions