Pass the Paloalto Networks Cloud Security Engineer PCCSE Questions and answers with CertsForce

Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions
Questions # 1:

Console is running in a Kubernetes cluster, and Defenders need to be deployed on nodes within this cluster.

How should the Defenders in Kubernetes be deployed using the default Console service name?

Options:

A.

From the deployment page in Console, choose "twistlock-console" for Console identifier, generate DaemonSet file, and apply DaemonSet to the twistlock namespace.


B.

From the deployment page, configure the cloud credential in Console and allow cloud discovery to auto-protect the Kubernetes nodes.


C.

From the deployment page in Console, choose "twistlock-console" for Console identifier and run the "curl | bash" script on the master Kubernetes node.


D.

From the deployment page in Console, choose "pod name" for Console identifier, generate DaemonSet file, and apply the DaemonSet to twistlock namespace.


Questions # 2:

Who can access saved searches in a cloud account?

Options:

A.

Administrators


B.

Users who can access the tenant


C.

Creators


D.

All users with whom the saved search has been shared


Questions # 3:

Which action would be applicable after enabling anomalous compute provisioning?

Options:

A.

It detects the activity caused by the spambot.


B.

It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment.


C.

It detects potential creation of an unauthorized network of compute instances with AutoFocus.


D.

It detects potential creation of an unauthorized network of compute instances either accidentally or for cryptojacking.


Questions # 4:

Which report includes an executive summary and a list of policy violations, including a page with details for each policy?

Options:

A.

Compliance Standard


B.

Business Unit


C.

Cloud Security Assessment


D.

Detailed


Questions # 5:

A customer has a requirement to automatically protect all Lambda functions with runtime protection. What is the process to automatically protect all the Lambda functions?

Options:

A.

Configure a function scan policy from the Defend/Vulnerabilities/Functions page.


B.

Configure serverless radar from the Defend/Compliance/Cloud Platforms page.


C.

Configure a manually embedded Lambda Defender.


D.

Configure a serverless auto-protect rule for the functions.


Questions # 6:

Which order of steps map a policy to a custom compliance standard?

(Drag the steps into the correct order of occurrence, from the first step to the last.)

Question # 6


Questions # 7:

Given the following RQL:

Which audit event snippet is identified by the RQL?

A)

B)

C)

D)

Question # 7

Options:

A.

Option A


B.

Option B


C.

Option C


D.

Option D


Questions # 8:

In which Console menu would an administrator verify whether a custom compliance check is failing or passing?

Options:

A.

Monitor > Compliance


B.

Container Security > Compliance


C.

Defend > Compliance


D.

Custom > Compliance


Questions # 9:

Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?

Options:

A.

Host


B.

Container


C.

Functions


D.

Image


Questions # 10:

Which two IDE plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.)

Options:

A.

BitBucket


B.

Visual Studio Code


C.

CircleCI


D.

IntelliJ


Viewing page 1 out of 8 pages
Viewing questions 1-10 out of questions