Pass the Paloalto Networks PSE-Prisma Cloud Professional PSE-Prisma-Pro-24 Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

Palo Alto Networks recommends which two options for outbound HA design in Amazon Web Services using VM-Series NGFW? (Choose two.)

Options:

A.

iLB-as-next-hop


B.

transit gateway and security VPC with VM-Series


C.

traditional active/standby HA on VM-Series


D.

transit VPC and security VPC with VM-Series


Expert Solution
Questions # 12:

When an on-premises NGFW (customer gateway) is used to connect to the Virtual Gateway, which two IKE profiles cannot be used? (Choose two.)

Options:

A.

Group2 / SHA-1 / AES-128-CBC / IKE-V1


B.

Group2 / SHA-1 / AES-128-GCM / IKE-V1


C.

Group14 / SHA-256 / AES-256-GCM / IKE-V1


D.

Group2 / SHA-1 / AES-128-CBC


E.

Group14 / SHA-256 / AES-256-CBC / IKE-V1


Expert Solution
Questions # 13:

Which pattern syntax will add all images to a trusted images rule within a registry?

Options:

A.

*.acme.com


B.

acme/*


C.

acme.com/myrepo/allimages:/*


D.

registry.acme.com/*


Expert Solution
Questions # 14:

Which statement explains the correlation between the block and alert thresholds in a vulnerability management policy?

Options:

A.

The thresholds can be set to informational, low, medium, high, and critical.


B.

The alert threshold always has precedence over, and can be greater than, the block threshold.


C.

The block threshold must always be equal to or greater than the alert threshold.


D.

The block threshold always has precedence over, and can be less than, the alert threshold.


Expert Solution
Questions # 15:

Which RQL string using network query attributes returns all traffic destined for Internet or for Suspicious IPs that also exceeds 1GB?

Options:

A.

network where publicnetwork = ('Internet IPs', 'Suspicious IPs') AND bytes > 1000000000


B.

network where dest publicnetwork IN ('Internet IPs', 'Suspicious IPs') AND bytes > 1000000000


C.

show traffic where destination.network = ('Internet IPs', 'Suspicious IPs') AND bytes > 1000000000


D.

network where bytes > 1GB and destination = 'Internet IPs' OR 'Suspicious IPs'


Expert Solution
Questions # 16:

Which two valid effects are used to deal with images within a rule for trusted images? (Choose two.)

Options:

A.

Deny


B.

Alert


C.

Block


D.

Ignore


Expert Solution
Questions # 17:

Match the logging service with its cloud provider.

Question # 17


Expert Solution
Questions # 18:

Which Resource Query Language (RQL) query returns a list of all TERMINATED Google Compute Engine (GCE) instances?

Options:

A.

Config from.cloud.resource where api.name = „gcloud-compute-instance-list" and json.rule = status == TERMINATED


B.

Config from.cloud.resource where api.name = „gcloud-compute-instance-list" and json.rule = TERMINATED


C.

Config from.cloud.resource where api.name = „gcloud-compute-instance-list" and json.rule = status contains TERMINATED


D.

Config from.cloud.resource where api.name = „gcloud-compute-instance-list" and json.rule = is TERMINATED


Expert Solution
Questions # 19:

Which two deployment methods are supported for Prisma Cloud Compute (PCC) container Defenders? (Choose two.)

Options:

A.

Azure SQL database instances


B.

Google Kubernetes Engine


C.

Oracle Functions service


D.

Kubernetes DaemonSet


Expert Solution
Questions # 20:

Which pillar of the Prisma Cloud platform provides support for both public and private clouds as well as flexible agentless scanning and agent-based protection?

Options:

A.

Cloud Network Security


B.

Cloud Security Posture Management


C.

Cloud Identity Security


D.

Cloud Workload Protection (CWP)


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions