New Year Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Palo Alto Networks Cloud Security Professional Question and Answers

Palo Alto Networks Cloud Security Professional

Last Update Jan 14, 2026
Total Questions : 258

We are offering FREE CloudSec-Pro Paloalto Networks exam questions. All you do is to just go and sign up. Give your details, prepare CloudSec-Pro free exam questions and then go for complete pool of Palo Alto Networks Cloud Security Professional test questions that will help you more.

CloudSec-Pro pdf

CloudSec-Pro PDF

$36.75  $104.99
CloudSec-Pro Engine

CloudSec-Pro Testing Engine

$43.75  $124.99
CloudSec-Pro PDF + Engine

CloudSec-Pro PDF + Testing Engine

$57.75  $164.99
Questions 1

What is the primary purpose of Prisma Cloud Code Security?

Options:

A.  

To provide a platform for developers to create custom security policies for applications

B.  

To triage alerts and incidents in realtime during deployment

C.  

To address cloud infrastructure misconfigurations in code before they become alerts or incidents

D.  

To offer instant feedback on application performance issues and bottlenecks

Discussion 0
Questions 2

A customer has a requirement to scan serverless functions for vulnerabilities.

What is the correct option to configure scanning?

Options:

A.  

Configure serverless radar from the Defend > Compliance > Cloud Platforms page.

B.  

Embed serverless Defender into the function.

C.  

Configure a function scan policy from the Defend > Vulnerabilities > Functions page.

D.  

Use Lambda layers to deploy a Defender into the function.

Discussion 0
Questions 3

Which two bot types are part of Web Application and API Security (WAAS) bot protection? (Choose two.)

Options:

A.  

Chat bots

B.  

User-defined bots

C.  

Unknown bots

D.  

Customer bots

Discussion 0
Questions 4

The Compute Console has recently been upgraded, and the administrator plans to delay upgrading the Defenders and the Twistcli tool until some of the team’s resources have been rescaled. The Console is currently one major release ahead.

What will happen as a result of the Console upgrade?

Options:

A.  

Defenders will disconnect, and Twistcli will stop working.

B.  

Defenders will disconnect, and Twistcli will remain working.

C.  

Both Defenders and Twistcli will remain working.

D.  

Defenders will remain connected, and Twistcli will stop working.

Discussion 0
Questions 5

Given the following information, which twistcli command should be run if an administrator were to exec into a running container and scan it from within using an access token for authentication?

• Console is located at https://prisma-console.mydomain.local

• Token is: TOKEN_VALUE

• Report ID is: REPORTJD

• Container image running is: myimage:latest

Options:

A.  

twistcli images scan --address https://prisma-console.mydomain.local —token TOKENVALUE —containerized —details myimage:latest

B.  

twistcli images scan —console-address https://prisma-console.mydomain.local —auth-token MY_TOKEN —local-scan —details myimage:latest

C.  

twistcli images scan —address https://prisma-console.mydomain.local —token TOKEN_VALUE —containerized --details REPORT_ID

D.  

twistcli images scan --console-address https://prisma-console.mydomain.local --auth-token TOKEN_VALUE —containerized —vulnerability-details REPORT_ID

Discussion 0
Questions 6

Which action must be taken to enable a user to interact programmatically with the Prisma Cloud APIs and for a nonhuman entity to be enabled for the access keys?

Options:

A.  

Create a role with System Admin and generate access keys.

B.  

Create a user with a role that has minimal access.

C.  

Create a role with Account Group Read Only and assign it to the user.

D.  

Create a role and assign it to the Service Account.

Discussion 0
Questions 7

A customer finds that an open alert from the previous day has been resolved. No auto-remediation was configured.

Which two reasons explain this change in alert status? (Choose two.)

Options:

A.  

user manually changed the alert status.

B.  

policy was changed.

C.  

resource was deleted.

D.  

alert was sent to an external integration.

Discussion 0
Questions 8

How is the scope of each rule determined in the Prisma Cloud Compute host runtime policy?

Options:

A.  

By the collection assigned to that rule

B.  

By the target workload

C.  

By the order in which it is created

D.  

By the type of network traffic it controls

Discussion 0
Questions 9

Which two integrations enable ingesting host findings to generate alerts? (Choose two.)

Options:

A.  

Splunk

B.  

Tenable

C.  

JIRA

D.  

Qualys

Discussion 0
Questions 10

Which statement accurately characterizes SSO Integration on Prisma Cloud?

Options:

A.  

Prisma Cloud supports IdP initiated SSO, and its SAML endpoint supports the POST and GET methods.

B.  

Okta, Azure Active Directory, PingID, and others are supported via SAML.

C.  

An administrator can configure different Identity Providers (IdP) for all the cloud accounts that Prisma Cloud monitors.

D.  

An administrator who needs to access the Prisma Cloud API can use SSO after configuration.

Discussion 0
Questions 11

What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?

Options:

A.  

To sort through large amounts of audit data manually in order to identify developing attacks

B.  

To store large amounts of forensic data on the host where Console runs to enable a more rapid and effectiveresponse to incidents

C.  

To correlate individual events to identify potential attacks and provide a sequence of process, file system, and network events for a comprehensive view of an incident

D.  

To identify and suppress all audit events generated by the defender

Discussion 0
Questions 12

Which field is required during the creation of a custom config query?

Options:

A.  

resource status

B.  

api.name

C.  

finding.type

D.  

cloud.type

Discussion 0
Questions 13

How does assigning an account group to an administrative user on Prisma Cloud help restrict access to resources?

Options:

A.  

It restricts access only to certain types of resources within the cloud account.

B.  

It restricts access to all resources and data within the cloud account.

C.  

It restricts access only to the resources and data that pertains to the cloud account(s) within an account group.

D.  

It does not restrict access to any resources within the cloud account.

Discussion 0
Questions 14

Which policy type provides information about connections from suspicious IPs in a customer database?

Options:

A.  

Anomaly

B.  

Threat detection

C.  

Network

D.  

AutoFocus

Discussion 0
Questions 15

What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?

Options:

A.  

policy

B.  

incident

C.  

audit

D.  

anomaly

Discussion 0
Questions 16

The development team wants to fail CI jobs where a specific CVE is contained within the image. How should the development team configure the pipeline or policy to produce this outcome?

Options:

A.  

Set the specific CVE exception as an option in Jenkins or twistcli.

B.  

Set the specific CVE exception as an option in Defender running the scan.

C.  

Set the specific CVE exception as an option using the magic string in the Console.

D.  

Set the specific CVE exception in Console’s CI policy.

Discussion 0
Questions 17

Given this information:

The Console is located at https://prisma-console.mydomain.local The username is: cluster

The password is: password123

The image to scan is: myimage:latest

Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?

Options:

A.  

twistcli images scan --console-address https://prisma-console.mydomain.local -u cluster -p password123 -- details myimage:latest

B.  

twistcli images scan --console-address prisma-console.mydomain.local -u cluster -p password123 -- vulnerability-details myimage:latest

C.  

twistcli images scan --address prisma-console.mydomain.local -u cluster -p password123 --vulnerability- details myimage:latest

D.  

twistcli images scan --address https://prisma-console.mydomain.local -u cluster -p password123 --details myimage:latest

Discussion 0
Questions 18

Prisma Cloud supports which three external systems that allow the import of vulnerabilities and provide additional context on risks in the cloud? (Choose three.)

Options:

A.  

Splunk

B.  

Qualys

C.  

Amazon Inspector

D.  

Amazon GuardDuty

E.  

ServiceNow

Discussion 0
Questions 19

Which two statements explain differences between build and run config policies? (Choose two.)

Options:

A.  

Run and Network policies belong to the configuration policy set.

B.  

Build policies allow checking for security misconfigurations in the IaC templates and ensure these issues do not get into production.

C.  

Run policies monitor network activities in the environment and check for potential issues during runtime.

D.  

Run policies monitor resources and check for potential issues after these cloud resources are deployed.

Discussion 0
Questions 20

A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company’s AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded individually.

The business unit has decided to cover the scope of this action and determined that a script should be written to onboard each of these accounts with general settings to gain immediate posture visibility across the accounts.

Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?

Options:

A.  

https://api.prismacloud.io/cloud/

B.  

https://api.prismacloud.io/account/aws

C.  

https://api.prismacloud.io/cloud/aws

D.  

https://api.prismacloud.io/accountgroup/aws

Discussion 0
Questions 21

A user from an organization is unable to log in to Prisma Cloud Console after having logged in the previous day.

Which area on the Console will provide input on this issue?

Options:

A.  

SSO

B.  

Audit Logs

C.  

Users & Groups

D.  

Access Control

Discussion 0
Questions 22

Which data storage type is supported by Prisma Cloud Data Security?

Options:

A.  

IBM Cloud Object Storage

B.  

AWS S3 buckets

C.  

Oracle Object Storage

D.  

Google storage class

Discussion 0
Questions 23

What are two key requirements for integrating Okta with Prisma Cloud when multiple Amazon Web Services (AWS) cloud accounts are being used? (Choose two.)

Options:

A.  

Super Administrator permissions

B.  

A valid subscription for the IAM security module

C.  

An Okta API token for the primary AWS account

D.  

Multiple instances of the Okta app

Discussion 0
Questions 24

What will happen when a Prisma Cloud Administrator has configured agentless scanning in an environment that also has Host and Container Defenders deployed?

Options:

A.  

Agentless scan will automatically be disabled, so Defender scans are the only scans occurring.

B.  

Agentless scans do not conflict with Defender scans, so both will run.

C.  

Defender scans will automatically be disabled, so agentless scans are the only scans occurring.

D.  

Both agentless and Defender scans will be disabled and an error message will be received.

Discussion 0
Questions 25

Which API calls can scan an image named myimage: latest with twistcli and then retrieve the results from Console?

Options:

A.  

$ twistcli images scan \--address \--user \--password \--verbose \myimage: latest

B.  

$ twistcli images scan \--address \--user \--password \--details \myimage: latest

C.  

$ twistcli images scan \--address \--user \--password \myimage: latest

D.  

$ twistcli images scan \--address \--user \--password \--console \myimage: latest

Discussion 0
Questions 26

On which cloud service providers can you receive new API release information for Prisma Cloud?

Options:

A.  

AWS, Azure, GCP, Oracle, IBM

B.  

AWS, Azure, GCP, Oracle, Alibaba

C.  

AWS, Azure, GCP, IBM

D.  

AWS, Azure, GCP, IBM, Alibaba

Discussion 0
Questions 27

Which of the below actions would indicate – “The timestamp on the compliance dashboard?

Options:

A.  

indicates the most recent data

B.  

indicates the most recent alert generated

C.  

indicates when the data was ingested

D.  

indicates when the data was aggregated for the results displayed

Discussion 0
Questions 28

In WAAS Access control file upload controls, which three file types are supported out of the box? (Choose three.)

Options:

A.  

Text

B.  

Images

C.  

Audio

D.  

Documents

E.  

Journal

Discussion 0
Questions 29

Which serverless cloud provider is covered by the "overly permissive service access" compliance check?

Options:

A.  

Alibaba

B.  

Azure

C.  

Amazon Web Services (AWS)

D.  

Google Cloud Platform (GCP)

Discussion 0
Questions 30

Prisma Cloud cannot integrate which of the following secrets managers?

Options:

A.  

IBM Secret Manager

B.  

AzureKey Vault

C.  

HashiCorp Vault

D.  

AWS Secret Manager

Discussion 0
Questions 31

What is the frequency to create a compliance report? (Choose two.)

Options:

A.  

Weekly

B.  

One time

C.  

Monthly

D.  

Recurring

Discussion 0
Questions 32

In Prisma Cloud Software Release 22.06 (Kepler), which Registry type is added?

Options:

A.  

Azure Container Registry

B.  

Google Artifact Registry

C.  

IBM Cloud Container Registry

D.  

Sonatype Nexus

Discussion 0
Questions 33

Which “kind” of Kubernetes object is configured to ensure that Defender is acting as the admission controller?

Options:

A.  

MutatingWebhookConfiguration

B.  

DestinationRules

C.  

ValidatingWebhookConfiguration

D.  

PodSecurityPolicies

Discussion 0
Questions 34

The InfoSec team wants to be notified via email each time a Security Group is misconfigured. Which Prisma Cloud tab should you choose to complete this request?

Options:

A.  

Notifications

B.  

Policies

C.  

Alert Rules

D.  

Events

Discussion 0
Questions 35

Which command should be used in the Prisma Cloud twistcli tool to scan the nginx:latest image for vulnerabilities and compliance issues?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 36

Which set of steps is the correct process for obtaining Console images for Prisma Cloud Compute Edition?

Options:

A.  

To retrieve Prisma Cloud Console images using basic authentication: 1. Access registry.twistlock.com and authenticate using "docker login."2. Retrieve the Prisma Cloud Console images using "docker pull."

B.  

To retrieve Prisma Cloud Console images using URL authentication:1. Access registry-url-auth.twistlock.com and authenticate using the user certificate.2. Retrieve the Prisma Cloud Console images using "docker pull."

C.  

To retrieve Prisma Cloud Console images using URL authentication: 1. Access registry-auth.twistlock.com and authenticate using the user certificate.2. Retrieve the Prisma Cloud Console images using "docker pull."

D.  

To retrieve Prisma Cloud Console images using basic authentication:1. Access registry.paloaltonetworks.com and authenticate using "docker login."2. Retrieve the Prisma Cloud Console images using "docker pull."

Discussion 0
Questions 37

Which alerts are fixed by enablement of automated remediation?

Options:

A.  

All applicable open alerts regardless of when they were generated, with alert status updated to "resolved"

B.  

Only the open alerts that were generated before the enablement of remediation, with alert status updated to "resolved"

C.  

All applicable open alerts regardless of when they were generated, with alert status updated to "dismissed"

D.  

Only the open alerts that were generated after the enablement of remediation, with alert status updated to "resolved"

Discussion 0
Questions 38

Which container image scan is constructed correctly?

Options:

A.  

twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/ latest

B.  

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest

C.  

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest

D.  

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest --details

Discussion 0
Questions 39

Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.

Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?

Options:

A.  

From the deployment page in Console, choose pod name for Console identifier, generate DaemonSet file, and apply the DaemonSet to twistlock namespace.

B.  

From the deployment page configure the cloud credential in Console and allow cloud discovery to auto-protect the Kubernetes nodes.

C.  

From the deployment page in Console, choose twistlock-console for Console identifier, generate DaemonSet file, and apply DaemonSet to the twistlock namespace.

D.  

From the deployment page in Console, choose twistlock-console for Console identifier, and run the curl | bash script on the master Kubernetes node.

Discussion 0
Questions 40

You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant’s existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.

Which option shows the steps required during the alert rule creation process to achieve this objective?

Options:

A.  

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert ruleSelect “select all policies” checkbox as part of the alert rule Confirm the alert rule

B.  

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert ruleSelect one or more policies checkbox as part of the alert rule Confirm the alert rule

C.  

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert ruleSelect one or more policies as part of the alert rule Add alert notificationsConfirm the alert rule

D.  

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert ruleSelect “select all policies” checkbox as part of the alert rule Add alert notificationsConfirm the alert rule

Discussion 0
Questions 41

A customer wants to turn on Auto Remediation.

Which policy type has the built-in CLI command for remediation?

Options:

A.  

Anomaly

B.  

Audit Event

C.  

Network

D.  

Config

Discussion 0
Questions 42

Which resources can be added in scope while creating a vulnerability policy for continuous integration?

Options:

A.  

Labels and AccountID

B.  

Images and labels

C.  

Images and cluster

D.  

Images and containers

Discussion 0
Questions 43

Which three platforms support the twistcli tool? (Choose three.)

Options:

A.  

Linux

B.  

Windows

C.  

Android

D.  

MacOS

E.  

Solaris

Discussion 0
Questions 44

Which three elements are part of SSH Events in Host Observations? (Choose three.)

Options:

A.  

Startup process

B.  

User

C.  

System calls

D.  

Process path

E.  

Command

Discussion 0
Questions 45

Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts.

Where can the administrator locate this list of e-mail recipients?

Options:

A.  

Target section within an Alert Rule.

B.  

Notification Template section within Alerts.

C.  

Users section within Settings.

D.  

Set Alert Notification section within an Alert Rule.

Discussion 0
Questions 46

A customer has configured the JIT, and the user created by the process is trying to log in to the Prisma Cloud console. The user encounters the following error message:

What is the reason for the error message?

Options:

A.  

The attribute name is not set correctly in JIT settings.

B.  

The user does not exist.

C.  

The user entered an incorrect password

D.  

The role is not assigned for the user.

Discussion 0
Questions 47

What is an example of an outbound notification within Prisma Cloud?

Options:

A.  

AWS Inspector

B.  

Qualys

C.  

Tenable

D.  

PagerDuty

Discussion 0
Questions 48

Which RQL query will help create a custom identity and access management (1AM) policy to alert on Lambda functions that have permission to terminate EC2 instances?

Options:

A.  

iam from cloud.resource where dest.cloud.type = ’AWS’ AND source.cloud.service.name = ’lambda’ AND source.cloud.resource.type = ’function’ AND dest.cloud.service.name = ’ec2’ AND action.name = ’ec2:TerminateInstances’

B.  

config from iam where dest.cloud.type = ’AWS’ AND source.cloud.service.name = ’ec2’ AND source.cloud.resource.type = ’instance’ AND dest.cloud.service.name = ’lambda’ AND action.name = ’ec2:TerminateInstances’

C.  

iam from cloud.resource where cloud.type equals ’AWS’ AND cloud.resource.type equals ’lambda function’ AND cloud.service.name = ’ec2’ AND action.name equals ’ec2:TerminateInstances’

D.  

config from iam where dest.cloud.type = ’AWS’ AND source.cloud.service.name = ’lambda’ AND source.cloud.resource.type = ’function’ AND dest.cloud.service.name = ’ec2’ AND action.name = ’ec2:TerminateInstances’

Discussion 0
Questions 49

Which two statements apply to the Defender type Container Defender - Linux?

Options:

A.  

It is implemented as runtime protection in the userspace.

B.  

It is deployed as a service.

C.  

It is deployed as a container.

D.  

It is incapable of filesystem runtime defense.

Discussion 0
Questions 50

During the Learning phase of the Container Runtime Model, Prisma Cloud enters a “dry run” period for how many hours?

Options:

A.  

4

B.  

48

C.  

1

D.  

24

Discussion 0
Questions 51

Which two statements are true about the differences between build and run config policies? (Choose two.)

Options:

A.  

Run and Network policies belong to the configuration policy set.

B.  

Build and Audit Events policies belong to the configuration policy set.

C.  

Run policies monitor resources, and check for potential issues after these cloud resources are deployed.

D.  

Build policies enable you to check for security misconfigurations in the IaC templates and ensure that these issues do not get into production.

E.  

Run policies monitor network activities in your environment, and check for potential issues during runtime.

Discussion 0
Questions 52

Which type of RQL query should be run to determine if AWS Elastic Compute Cloud (EC2) instances without encryption was enabled?

Options:

A.  

NETWORK

B.  

EVENT

C.  

CONFIG

D.  

SECURITY

Discussion 0
Questions 53

Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?

Options:

A.  

Host

B.  

Container

C.  

Functions

D.  

Image

Discussion 0
Questions 54

Prisma Cloud supports sending audit event records to which three targets? (Choose three.)

Options:

A.  

SNMP Traps

B.  

Syslog

C.  

Stdout

D.  

Prometheus

E.  

Netflow

Discussion 0
Questions 55

What improves product operationalization by adding visibility into feature utilization and missed opportunities?

Options:

A.  

Adoption Advisor

B.  

Alarm Advisor

C.  

Alert Center

D.  

Alarm Center

Discussion 0
Questions 56

Which two frequency options are available to create a compliance report within the console? (Choose two.)

Options:

A.  

One-time

B.  

Monthly

C.  

Recurring

D.  

Weekly

Discussion 0
Questions 57

What are two ways to scan container images in Jenkins pipelines? (Choose two.)

Options:

A.  

twistcli

B.  

Jenkins Docker plugin

C.  

Compute Jenkins plugin

D.  

Compute Azure DevOps plugin

E.  

Prisma Cloud Visual Studio Code plugin with Jenkins integration

Discussion 0
Questions 58

Which three serverless runtimes are supported by Prisma Cloud for vulnerability and compliance scans? (Choose three.)

Options:

A.  

Swift

B.  

Python

C.  

Dart

D.  

Java

E.  

Node.js

Discussion 0
Questions 59

Which two attributes of policies can be fetched using API? (Choose two.)

Options:

A.  

policy label

B.  

policy signature

C.  

policy mode

D.  

policy violation

Discussion 0
Questions 60

A security team has been asked to create a custom policy.

Which two methods can the team use to accomplish this goal? (Choose two.)

Options:

A.  

add a new policy

B.  

clone an existing policy

C.  

disable an out-of-the-box policy

D.  

edit the query in the out-of-the-box policy

Discussion 0
Questions 61

The attempted bytes count displays?

Options:

A.  

traffic that is either denied by the security group or firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

B.  

traffic that is either denied by the security group or firewall rules.

C.  

traffic that is either denied by the firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

D.  

traffic denied by the security group or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

Discussion 0
Questions 62

In Prisma Cloud for Azure Net Effective Permissions Calculation, the following Azure permission levels are supported by which three permissions? (Choose three).

Options:

A.  

Resources

B.  

Tenant

C.  

Subscription

D.  

Resource groups

E.  

Management Group

Discussion 0
Questions 63

Which RQL query type is invalid?

Options:

A.  

Event

B.  

IAM

C.  

Incident

D.  

Config

Discussion 0
Questions 64

Which three steps are involved in onboarding an account for Data Security? (Choose three.)

Options:

A.  

Create a read-only role with in-line policies

B.  

Create a Cloudtrail with SNS Topic

C.  

Enable Flow Logs

D.  

Enter the RoleARN and SNSARN

E.  

Create a S3 bucket

Discussion 0
Questions 65

Which statement is true regarding CloudFormation templates?

Options:

A.  

Scan support does not currently exist for nested references, macros, or intrinsic functions.

B.  

A single template or a zip archive of template files cannot be scanned with a single API request.

C.  

Request-Header-Field ‘cloudformation-version’ is required to request a scan.

D.  

Scan support is provided for JSON, HTML and YAML formats.

Discussion 0
Questions 66

Taking which action will automatically enable all severity levels?

Options:

A.  

Navigate to Settings > Enterprise Settings and enable all severity levels in the alarm center.

B.  

Navigate to Policies > Settings and enable all severity levels in the alarm center.

C.  

Navigate to Settings > Enterprise Settings and ensure all severity levels are checked under "auto-enable default policies.

D.  

Navigate to Policies > Settings and ensure all severity levels are checked under "auto-enable default policies.

Discussion 0
Questions 67

A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)

Options:

A.  

The value of the mined currency exceeds $100.

B.  

High CPU usage over time for the container is detected.

C.  

Common cryptominer process name was found.

D.  

The mined currency is associated with a user token.

E.  

Common cryptominer port usage was found.

Discussion 0
Questions 68

Which two information types cannot be seen in the data security dashboard? (Choose two).

Options:

A.  

Bucket owner

B.  

Object Data Profile by Region

C.  

Top Publicly Exposed Objects By Data Profile

D.  

Object content

E.  

Total objects

Discussion 0
Questions 69

Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.

Where should the customer navigate in Console?

Options:

A.  

Monitor > Compliance

B.  

Defend > Compliance

C.  

Manage > Compliance

D.  

Custom > Compliance

Discussion 0
Questions 70

What is the order of steps to create a custom network policy?

(Drag the steps into the correct order of occurrence, from the first step to the last.)

Options:

Discussion 0
Questions 71

Which resource and policy type are used to calculate AWS Net Effective Permissions? (Choose two.)

Options:

A.  

Service Linked Roles

B.  

Lambda Function

C.  

Amazon Resource Names (ARNs) using Wild Cards

D.  

AWS Service Control Policies (SCPs)

Discussion 0
Questions 72

During an initial deployment of Prisma Cloud Compute, the customer sees vulnerabilities in their environment.

Which statement correctly describes the default vulnerability policy?

Options:

A.  

It blocks all containers that contain a vulnerability.

B.  

It alerts on any container with more than three critical vulnerabilities.

C.  

It blocks containers after 30 days if they contain a critical vulnerability.

D.  

It alerts on all vulnerabilities, regardless of severity.

Discussion 0
Questions 73

Which two roles have access to view the Prisma Cloud policies? (Choose two.)

Options:

A.  

Build AND Deploy Security

B.  

Auditor

C.  

Dev SecOps

D.  

Defender Manager

Discussion 0
Questions 74

The compliance team needs to associate Prisma Cloud policies with compliance frameworks. Which option should the team select to perform this task?

Options:

A.  

Custom Compliance

B.  

Policies

C.  

Compliance

D.  

Alert Rules

Discussion 0
Questions 75

A Prisma Cloud Administrator onboarded an AWS cloud account with agentless scanning enabled successfully to Prisma Cloud. Which item requires deploying defenders to be able to inspect the risk on the onboarded AWS account?

Options:

A.  

Host compliances risks

B.  

Container runtime risks

C.  

Container vulnerability risks

D.  

Host vulnerability risks

Discussion 0
Questions 76

What are two built-in RBAC permission groups for Prisma Cloud? (Choose two.)

Options:

A.  

Group Membership Admin

B.  

Group Admin

C.  

Account Group Admin

D.  

Account Group Read Only

Discussion 0
Questions 77

Where can Defender debug logs be viewed? (Choose two.)

Options:

A.  

/var/lib/twistlock/defender.log

B.  

From the Console, Manage > Defenders > Manage > Defenders. Select the Defender from the deployed Defenders list, then click Actions > Logs

C.  

From the Console, Manage > Defenders > Deploy > Defenders. Select the Defender from the deployed Defenders list, then click Actions > Logs

D.  

/var/lib/twistlock/log/defender.log

Discussion 0