New Year Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: simple70

Pass the Paloalto Networks Cloud Security Engineer CloudSec-Pro Questions and answers with CertsForce

Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions
Questions # 61:

Order the steps involved in onboarding an AWS Account for use with Data Security feature.

Question # 61


Expert Solution
Questions # 62:

What should be used to associate Prisma Cloud policies with compliance frameworks?

Options:

A.

Compliance


B.

Custom compliance


C.

Alert rules


D.

Policies


Expert Solution
Questions # 63:

Which action would be applicable after enabling anomalous compute provisioning?

Options:

A.

It detects the activity caused by the spambot.


B.

It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment.


C.

It detects potential creation of an unauthorized network of compute instances with AutoFocus.


D.

It detects potential creation of an unauthorized network of compute instances either accidentally or for cryptojacking.


Expert Solution
Questions # 64:

A customer has multiple violations in the environment including:

User namespace is enabled

An LDAP server is enabled

SSH root is enabled

Which section of Console should the administrator use to review these findings?

Options:

A.

Manage


B.

Vulnerabilities


C.

Radar


D.

Compliance


Expert Solution
Questions # 65:

The security team wants to protect a web application container from an SQLi attack. Which type of policy should the administrator create to protect the container?

Options:

A.

CNAF


B.

Runtime


C.

Compliance


D.

CNNF


Expert Solution
Questions # 66:

Which three serverless runtimes are supported by Prisma Cloud for vulnerability and compliance scans? (Choose three.)

Options:

A.

Swift


B.

Python


C.

Dart


D.

Java


E.

Node.js


Expert Solution
Questions # 67:

Review this admission control policy:

match[{"msg": msg}] { input.request.operation == "CREATE" input.request.kind.kind == "Pod" input.request.resource.resource == "pods"

input.request.object.spec.containers[_].securityContext.privileged msg := "Privileged"

}

Which response to this policy will be achieved when the effect is set to “block”?

Options:

A.

The policy will block all pods on a Privileged host.


B.

The policy will replace Defender with a privileged Defender.


C.

The policy will alert only the administrator when a privileged pod is created.


D.

The policy will block the creation of a privileged pod.


Expert Solution
Questions # 68:

The Compute Console has recently been upgraded, and the administrator plans to delay upgrading the Defenders and the Twistcli tool until some of the team’s resources have been rescaled. The Console is currently one major release ahead.

What will happen as a result of the Console upgrade?

Options:

A.

Defenders will disconnect, and Twistcli will stop working.


B.

Defenders will disconnect, and Twistcli will remain working.


C.

Both Defenders and Twistcli will remain working.


D.

Defenders will remain connected, and Twistcli will stop working.


Expert Solution
Questions # 69:

An organization wants to be notified immediately to any “High Severity” alerts for the account group “Clinical Trials” via Slack.

Which option shows the steps the organization can use to achieve this goal?

Options:

A.

1. Configure Slack Integration2.Create an alert rule and select “Clinical Trials” as the account group3.Under the “Select Policies” tab, filter on severity and select “High”4.Under the Set Alert Notification tab, choose Slack and populate the channel5.Set Frequency to “As it Happens”


B.

1. Create an alert rule and select “Clinical Trials” as the account group2.Under the “Select Policies” tab, filter on severity and select “High”3.Under the Set Alert Notification tab, choose Slack and populate the channel4.Set Frequency to “As it Happens”5.Set up the Slack Integration to complete the configuration


C.

1. Configure Slack Integration2.Create an alert rule3.Under the “Select Policies” tab, filter on severity and select “High”4.Under the Set Alert Notification tab, choose Slack and populate the channel5.Set Frequency to “As it Happens”


D.

1. Under the “Select Policies” tab, filter on severity and select “High”2.Under the Set Alert Notification tab, choose Slack and populate the channel3.Set Frequency to “As it Happens”4.Configure Slack Integration5.Create an Alert rule


Expert Solution
Questions # 70:

Which two attributes of policies can be fetched using API? (Choose two.)

Options:

A.

policy label


B.

policy signature


C.

policy mode


D.

policy violation


Expert Solution
Viewing page 7 out of 8 pages
Viewing questions 61-70 out of questions