Pass the Paloalto Networks Cloud Security Engineer PCCSE Questions and answers with CertsForce

Viewing page 8 out of 8 pages
Viewing questions 71-80 out of questions
Questions # 71:

Which role must be assigned to DevOps users who need access to deploy Container and Host Defenders in Compute?

Options:

A.

Cloud Provisioning Admin


B.

Build and Deploy Security


C.

System Admin


D.

Developer


Expert Solution
Questions # 72:

What is the order of steps in a Jenkins pipeline scan?

(Drag the steps into the correct order of occurrence, from the first step to the last.)


Expert Solution
Questions # 73:

Which alert deposition severity must be chosen to generate low and high severity alerts in the Anomaly settings when user wants to report on an unknown browser and OS, impossible time travel, or both due to account hijacking attempts?

Options:

A.

High


B.

Aggressive


C.

Moderate


D.

Conservative


Expert Solution
Questions # 74:

Which options show the steps required to upgrade Console when using projects?

Options:

A.

Upgrade all Supervisor Consoles Upgrade Central Console


B.

Upgrade Central Console

Upgrade Central Console Defenders


C.

Upgrade Defender Upgrade Central Console

Upgrade Supervisor Consoles


D.

Upgrade Central Console Upgrade all Supervisor Consoles


Expert Solution
Questions # 75:

What is the order of steps to create a custom network policy?

(Drag the steps into the correct order of occurrence, from the first step to the last.)

Question # 75


Expert Solution
Questions # 76:

Which two bot types are part of Web Application and API Security (WAAS) bot protection? (Choose two.)

Options:

A.

Chat bots


B.

User-defined bots


C.

Unknown bots


D.

Customer bots


Expert Solution
Questions # 77:

A customer has configured the JIT, and the user created by the process is trying to log in to the Prisma Cloud console. The user encounters the following error message:

What is the reason for the error message?

Options:

A.

The attribute name is not set correctly in JIT settings.


B.

The user does not exist.


C.

The user entered an incorrect password


D.

The role is not assigned for the user.


Expert Solution
Questions # 78:

Which three elements are part of SSH Events in Host Observations? (Choose three.)

Options:

A.

Startup process


B.

User


C.

System calls


D.

Process path


E.

Command


Expert Solution
Viewing page 8 out of 8 pages
Viewing questions 71-80 out of questions