Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Cloud Security Engineer CloudSec-Pro Questions and answers with CertsForce

Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which two statements explain differences between build and run config policies? (Choose two.)

Options:

A.

Run and Network policies belong to the configuration policy set.


B.

Build policies allow checking for security misconfigurations in the IaC templates and ensure these issues do not get into production.


C.

Run policies monitor network activities in the environment and check for potential issues during runtime.


D.

Run policies monitor resources and check for potential issues after these cloud resources are deployed.


Expert Solution
Questions # 2:

Match the service on the right that evaluates each exposure type on the left.

(Select your answer from the pull-down list. Answers may be used more than once or not at all.)

Question # 2


Expert Solution
Questions # 3:

Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).

Options:

A.

Spoke Account Mode


B.

Hub Account Mode


C.

Same Account Mode


D.

Main Account Mode


Expert Solution
Questions # 4:

Which two elements are included in the audit trail section of the asset detail view? (Choose two).

Options:

A.

Configuration changes


B.

Findings


C.

Overview


D.

Alert and vulnerability events


Expert Solution
Questions # 5:

Which three options are selectable in a CI policy for image scanning with Jenkins or twistcli? (Choose three.)

Options:

A.

Scope - Scans run on a particular host


B.

Credential


C.

Apply rule only when vendor fixes are available


D.

Failure threshold


E.

Grace Period


Expert Solution
Questions # 6:

A user from an organization is unable to log in to Prisma Cloud Console after having logged in the previous day.

Which area on the Console will provide input on this issue?

Options:

A.

SSO


B.

Audit Logs


C.

Users & Groups


D.

Access Control


Expert Solution
Questions # 7:

Which two filters are available in the SecOps dashboard? (Choose two.)

Options:

A.

Time range


B.

Account Groups


C.

Service Name


D.

Cloud Region


Expert Solution
Questions # 8:

Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?

Options:

A.

Host


B.

Container


C.

Functions


D.

Image


Expert Solution
Questions # 9:

Which three elements are part of SSH Events in Host Observations? (Choose three.)

Options:

A.

Startup process


B.

User


C.

System calls


D.

Process path


E.

Command


Expert Solution
Questions # 10:

Console is running in a Kubernetes cluster, and Defenders need to be deployed on nodes within this cluster.

How should the Defenders in Kubernetes be deployed using the default Console service name?

Options:

A.

From the deployment page in Console, choose "twistlock-console" for Console identifier, generate DaemonSet file, and apply DaemonSet to the twistlock namespace.


B.

From the deployment page, configure the cloud credential in Console and allow cloud discovery to auto-protect the Kubernetes nodes.


C.

From the deployment page in Console, choose "twistlock-console" for Console identifier and run the "curl | bash" script on the master Kubernetes node.


D.

From the deployment page in Console, choose "pod name" for Console identifier, generate DaemonSet file, and apply the DaemonSet to twistlock namespace.


Expert Solution
Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions