Month End Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Cloud Security Engineer CloudSec-Pro Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

An administrator has deployed Console into a Kubernetes cluster running in AWS. The administrator also has configured a load balancer in TCP passthrough mode to listen on the same ports as the default Prisma Compute Console configuration.

In the build pipeline, the administrator wants twistcli to talk to Console over HTTPS. Which port will twistcli need to use to access the Prisma Compute APIs?

Options:

A.

8084


B.

443


C.

8083


D.

8081


Expert Solution
Questions # 62:

Which two required request headers interface with Prisma Cloud API? (Choose two.)

Options:

A.

Content-type:application/json


B.

x-redlock-auth


C.

>x-redlock-request-id


D.

Content-type:application/xml


Expert Solution
Questions # 63:

Which serverless cloud provider is covered by the "overly permissive service access" compliance check?

Options:

A.

Alibaba


B.

Azure


C.

Amazon Web Services (AWS)


D.

Google Cloud Platform (GCP)


Expert Solution
Questions # 64:

An administrator has access to a Prisma Cloud Enterprise.

What are the steps to deploy a single container Defender on an ec2 node?

Options:

A.

Pull the Defender image to the ec2 node, copy and execute the curl | bash script, and start the Defender to ensure it is running.


B.

Execute the curl | bash script on the ec2 node.


C.

Configure the cloud credential in the console and allow cloud discovery to auto-protect the ec2 node.


D.

Generate DaemonSet file and apply DaemonSet to the twistlock namespace.


Expert Solution
Questions # 65:

The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely.

Which strategy should the administrator use to achieve this goal?

Options:

A.

Disable the policy


B.

Set the Alert Disposition to Conservative


C.

Change the Training Threshold to Low


D.

Set Alert Disposition to Aggressive


Expert Solution
Questions # 66:

A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.

How should the administrator configure Prisma Cloud Compute to satisfy this requirement?

Options:

A.

set the Container model to manual relearn and set the default runtime rule to block for process protection.


B.

set the Container model to relearn and set the default runtime rule to prevent for process protection.


C.

add a new runtime policy targeted at a specific Container name, add ransomWare process into the denied process list, and set the action to “prevent”.


D.

choose “copy into rule” for the Container, add a ransomWare process into the denied process list, and set the action to “block”.


Expert Solution
Questions # 67:

What happens when a role is deleted in Prisma Cloud?

Options:

A.

The access key associated with that role is automatically deleted.


B.

Any integrations that use the access key to make calls to Prisma Cloud will stop working.


C.

The users associated with that role will be deleted.


D.

Any user who uses that key will be deleted.


Expert Solution
Questions # 68:

Which Defender type performs registry scanning?

Options:

A.

Serverless


B.

Container


C.

Host


D.

RASP


Expert Solution
Questions # 69:

If you are required to run in an air-gapped environment, which product should you install?

Options:

A.

Prisma Cloud Jenkins Plugin


B.

Prisma Cloud Compute Edition


C.

Prisma Cloud with self-hosted plugin


D.

Prisma Cloud Enterprise Edition


Expert Solution
Questions # 70:

The administrator wants to review the Console audit logs from within the Console.

Which page in the Console should the administrator use to review this data, if it can be reviewed at all?

Options:

A.

Navigate to Monitor > Events > Host Log Inspection


B.

The audit logs can be viewed only externally to the Console


C.

Navigate to Manage > Defenders > View Logs


D.

Navigate to Manage > View Logs > History


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions