Month End Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

Prisma Certified Cloud Security Engineer Question and Answers

Prisma Certified Cloud Security Engineer

Last Update Sep 27, 2025
Total Questions : 260

We are offering FREE PCCSE Paloalto Networks exam questions. All you do is to just go and sign up. Give your details, prepare PCCSE free exam questions and then go for complete pool of Prisma Certified Cloud Security Engineer test questions that will help you more.

PCCSE pdf

PCCSE PDF

$36.75  $104.99
PCCSE Engine

PCCSE Testing Engine

$43.75  $124.99
PCCSE PDF + Engine

PCCSE PDF + Testing Engine

$57.75  $164.99
Questions 1

Which three actions are required in order to use the automated method within Azure Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose three.)

Options:

A.  

Install boto3 & requests library.

B.  

Configure IAM Azure remediation script.

C.  

Integrate with Azure Service Bus.

D.  

Configure IAM AWS remediation script.

E.  

Install azure.servicebus & requests library.

Discussion 0
Questions 2

What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?

Options:

A.  

To sort through large amounts of audit data manually in order to identify developing attacks

B.  

To store large amounts of forensic data on the host where Console runs to enable a more rapid and effective

response to incidents

C.  

To correlate individual events to identify potential attacks and provide a sequence of process, file system, and network events for a comprehensive view of an incident

D.  

To identify and suppress all audit events generated by the defender

Discussion 0
Questions 3

What is the order of steps to create a custom network policy?

(Drag the steps into the correct order of occurrence, from the first step to the last.)

Options:

Discussion 0
Questions 4

Which serverless cloud provider is covered by the "overly permissive service access" compliance check?

Options:

A.  

Alibaba

B.  

Azure

C.  

Amazon Web Services (AWS)

D.  

Google Cloud Platform (GCP)

Discussion 0
Questions 5

Which API calls can scan an image named myimage: latest with twistcli and then retrieve the results from Console?

Options:

A.  

$ twistcli images scan \

--address \

--user \

--password \

--verbose \

myimage: latest

B.  

$ twistcli images scan \

--address \

--user \

--password \

--details \

myimage: latest

C.  

$ twistcli images scan \

--address \

--user \

--password \

myimage: latest

D.  

$ twistcli images scan \

--address \

--user \

--password \

--console \

myimage: latest

Discussion 0
Questions 6

In Prisma Cloud Software Release 22.06 (Kepler), which Registry type is added?

Options:

A.  

Azure Container Registry

B.  

Google Artifact Registry

C.  

IBM Cloud Container Registry

D.  

Sonatype Nexus

Discussion 0
Questions 7

A customer has a requirement to automatically protect all Lambda functions with runtime protection. What is the process to automatically protect all the Lambda functions?

Options:

A.  

Configure a function scan policy from the Defend/Vulnerabilities/Functions page.

B.  

Configure serverless radar from the Defend/Compliance/Cloud Platforms page.

C.  

Configure a manually embedded Lambda Defender.

D.  

Configure a serverless auto-protect rule for the functions.

Discussion 0
Questions 8

A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.

How should the customer automate vulnerability scanning for images deployed to Fargate?

Options:

A.  

Set up a vulnerability scanner on the registry

B.  

Embed a Fargate Defender to automatically scan for vulnerabilities

C.  

Designate a Fargate Defender to serve a dedicated image scanner

D.  

Use Cloud Compliance to identify misconfigured AWS accounts

Discussion 0
Questions 9

Which statement is true regarding CloudFormation templates?

Options:

A.  

Scan support does not currently exist for nested references, macros, or intrinsic functions.

B.  

A single template or a zip archive of template files cannot be scanned with a single API request.

C.  

Request-Header-Field ‘cloudformation-version’ is required to request a scan.

D.  

Scan support is provided for JSON, HTML and YAML formats.

Discussion 0
Questions 10

In which Console menu would an administrator verify whether a custom compliance check is failing or passing?

Options:

A.  

Monitor > Compliance

B.  

Container Security > Compliance

C.  

Defend > Compliance

D.  

Custom > Compliance

Discussion 0
Questions 11

Given the following JSON query:

$.resource[*].aws_s3_bucket exists

Which tab is the correct place to add the JSON query when creating a Config policy?

Options:

A.  

Details

B.  

Compliance Standards

C.  

Remediation

D.  

Build Your Rule (Run tab)

E.  

Build Your Rule (Build tab)

Discussion 0
Questions 12

Which three steps are involved in onboarding an account for Data Security? (Choose three.)

Options:

A.  

Create a read-only role with in-line policies

B.  

Create a Cloudtrail with SNS Topic

C.  

Enable Flow Logs

D.  

Enter the RoleARN and SNSARN

E.  

Create a S3 bucket

Discussion 0
Questions 13

You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant’s existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.

Which option shows the steps required during the alert rule creation process to achieve this objective?

Options:

A.  

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule

Select “select all policies” checkbox as part of the alert rule Confirm the alert rule

B.  

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule

Select one or more policies checkbox as part of the alert rule Confirm the alert rule

C.  

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule

Select one or more policies as part of the alert rule Add alert notifications

Confirm the alert rule

D.  

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert rule

Select “select all policies” checkbox as part of the alert rule Add alert notifications

Confirm the alert rule

Discussion 0
Questions 14

An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant.

In which order will the APIs be executed for this service?

(Drag the steps into the correct order of occurrence, from the first step to the last.)

Options:

Discussion 0
Questions 15

Review this admission control policy:

match[{"msg": msg}] { input.request.operation == "CREATE" input.request.kind.kind == "Pod" input.request.resource.resource == "pods"

input.request.object.spec.containers[_].securityContext.privileged msg := "Privileged"

}

Which response to this policy will be achieved when the effect is set to “block”?

Options:

A.  

The policy will block all pods on a Privileged host.

B.  

The policy will replace Defender with a privileged Defender.

C.  

The policy will alert only the administrator when a privileged pod is created.

D.  

The policy will block the creation of a privileged pod.

Discussion 0
Questions 16

A security team has a requirement to ensure the environment is scanned for vulnerabilities. What are three options for configuring vulnerability policies? (Choose three.)

Options:

A.  

individual actions based on package type

B.  

output verbosity for blocked requests

C.  

apply policy only when vendor fix is available

D.  

individual grace periods for each severity level

E.  

customize message on blocked requests

Discussion 0
Questions 17

Which data storage type is supported by Prisma Cloud Data Security?

Options:

A.  

IBM Cloud Object Storage

B.  

AWS S3 buckets

C.  

Oracle Object Storage

D.  

Google storage class

Discussion 0
Questions 18

What are the two ways to scope a CI policy for image scanning? (Choose two.)

Options:

A.  

container name

B.  

image name

C.  

hostname

D.  

image labels

Discussion 0
Questions 19

Which three AWS policy types and identities are used to calculate the net effective permissions? (Choose three).

Options:

A.  

AWS service control policies (SCPs)

B.  

AWS IAM group

C.  

AWS IAM role

D.  

AWS IAM User

E.  

AWS IAM tag policy

Discussion 0
Questions 20

An administrator has access to a Prisma Cloud Enterprise.

What are the steps to deploy a single container Defender on an ec2 node?

Options:

A.  

Pull the Defender image to the ec2 node, copy and execute the curl | bash script, and start the Defender to ensure it is running.

B.  

Execute the curl | bash script on the ec2 node.

C.  

Configure the cloud credential in the console and allow cloud discovery to auto-protect the ec2 node.

D.  

Generate DaemonSet file and apply DaemonSet to the twistlock namespace.

Discussion 0
Questions 21

Which action would be applicable after enabling anomalous compute provisioning?

Options:

A.  

It detects the activity caused by the spambot.

B.  

It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment.

C.  

It detects potential creation of an unauthorized network of compute instances with AutoFocus.

D.  

It detects potential creation of an unauthorized network of compute instances either accidentally or for cryptojacking.

Discussion 0
Questions 22

A user from an organization is unable to log in to Prisma Cloud Console after having logged in the previous day.

Which area on the Console will provide input on this issue?

Options:

A.  

SSO

B.  

Audit Logs

C.  

Users & Groups

D.  

Access Control

Discussion 0
Questions 23

Given the following RQL:

event from cloud.audit_logs where operation IN (‘CreateCryptoKey’, ‘DestroyCryptoKeyVersion’, ‘v1.compute.disks.createSnapshot’)

Which audit event snippet is identified?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 24

The security team wants to protect a web application container from an SQLi attack. Which type of policy should the administrator create to protect the container?

Options:

A.  

CNAF

B.  

Runtime

C.  

Compliance

D.  

CNNF

Discussion 0
Questions 25

An administrator sees that a runtime audit has been generated for a container.

The audit message is:

“/bin/ls launched and is explicitly blocked in the runtime rule. Full command: ls -latr”

Which protection in the runtime rule would cause this audit?

Options:

A.  

Networking

B.  

File systems

C.  

Processes

D.  

Container

Discussion 0
Questions 26

What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?

Options:

A.  

It is a unique identifier needed only when Monitor & Protect mode is selected.

B.  

It is the resource name for the Prisma Cloud Role.

C.  

It is a UUID that establishes a trust relationship between the Prisma Cloud account and the AWS account in order to extract data.

D.  

It is the default name of the PrismaCloudApp stack.

Discussion 0
Questions 27

Which container image scan is constructed correctly?

Options:

A.  

twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/ latest

B.  

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest

C.  

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest

D.  

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest --details

Discussion 0
Questions 28

A customer is interested in PCI requirements and needs to ensure that no privilege containers can start in the environment.

Which action needs to be set for “do not use privileged containers”?

Options:

A.  

Prevent

B.  

Alert

C.  

Block

D.  

Fail

Discussion 0
Questions 29

What are the three states of the Container Runtime Model? (Choose three.)

Options:

A.  

Initiating

B.  

Learning

C.  

Active

D.  

Running

E.  

Archived

Discussion 0
Questions 30

During an initial deployment of Prisma Cloud Compute, the customer sees vulnerabilities in their environment.

Which statement correctly describes the default vulnerability policy?

Options:

A.  

It blocks all containers that contain a vulnerability.

B.  

It alerts on any container with more than three critical vulnerabilities.

C.  

It blocks containers after 30 days if they contain a critical vulnerability.

D.  

It alerts on all vulnerabilities, regardless of severity.

Discussion 0
Questions 31

What is the behavior of Defenders when the Console is unreachable during upgrades?

Options:

A.  

Defenders continue to alert, but not enforce, using the policies and settings most recently cached before upgrading the Console.

B.  

Defenders will fail closed until the web-socket can be re-established.

C.  

Defenders will fail open until the web-socket can be re-established.

D.  

Defenders continue to alert and enforce using the policies and settings most recently cached before upgrading the Console.

Discussion 0
Questions 32

A customer does not want alerts to be generated from network traffic that originates from trusted internal networks.

Which setting should you use to meet this customer’s request?

Options:

A.  

Trusted Login IP Addresses

B.  

Anomaly Trusted List

C.  

Trusted Alert IP Addresses

D.  

Enterprise Alert Disposition

Discussion 0
Questions 33

Which alert deposition severity must be chosen to generate low and high severity alerts in the Anomaly settings when user wants to report on an unknown browser and OS, impossible time travel, or both due to account hijacking attempts?

Options:

A.  

High

B.  

Aggressive

C.  

Moderate

D.  

Conservative

Discussion 0
Questions 34

Which options show the steps required to upgrade Console when using projects?

Options:

A.  

Upgrade all Supervisor Consoles Upgrade Central Console

B.  

Upgrade Central Console

Upgrade Central Console Defenders

C.  

Upgrade Defender Upgrade Central Console

Upgrade Supervisor Consoles

D.  

Upgrade Central Console Upgrade all Supervisor Consoles

Discussion 0
Questions 35

Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.

Where should the customer navigate in Console?

Options:

A.  

Monitor > Compliance

B.  

Defend > Compliance

C.  

Manage > Compliance

D.  

Custom > Compliance

Discussion 0
Questions 36

What will happen when a Prisma Cloud Administrator has configured agentless scanning in an environment that also has Host and Container Defenders deployed?

Options:

A.  

Agentless scan will automatically be disabled, so Defender scans are the only scans occurring.

B.  

Agentless scans do not conflict with Defender scans, so both will run.

C.  

Defender scans will automatically be disabled, so agentless scans are the only scans occurring.

D.  

Both agentless and Defender scans will be disabled and an error message will be received.

Discussion 0
Questions 37

An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to YAML.

Console Address: $CONSOLE_ADDRESS Websocket Address: $WEBSOCKET_ADDRESS User: $ADMIN_USER

Which command generates the YAML file for Defender install?

Options:

A.  

/twistcli defender \

--address $CONSOLE_ADDRESS \

--user $ADMIN_USER \

--cluster-address $CONSOLE_ADDRESS

B.  

/twistcli defender export kubernetes \

--address $WEBSOCKET_ADDRESS \

--user $ADMIN_USER \

--cluster-address $CONSOLE_ADDRESS

C.  

/twistcli defender YAML kubernetes \

--address $CONSOLE_ADDRESS \

--user $ADMIN_USER \

--cluster-address $WEBSOCKET_ADDRESS

D.  

/twistcli defender export kubernetes \

--address $CONSOLE_ADDRESS \

--user $ADMIN_USER \

--cluster-address $WEBSOCKET_ADDRESS

Discussion 0
Questions 38

A customer has configured the JIT, and the user created by the process is trying to log in to the Prisma Cloud console. The user encounters the following error message:

What is the reason for the error message?

Options:

A.  

The attribute name is not set correctly in JIT settings.

B.  

The user does not exist.

C.  

The user entered an incorrect password

D.  

The role is not assigned for the user.

Discussion 0
Questions 39

A Prisma Cloud administrator is tasked with pulling a report via API. The Prisma Cloud tenant is located on app2.prismacloud.io.

What is the correct API endpoint?

Options:

A.  

https://api.prismacloud.io

B.  

https://api2.eu.prismacloud.io

C.  

httsp://api.prismacloud.cn

D.  

https://api2.prismacloud.io

Discussion 0
Questions 40

A security team has been asked to create a custom policy.

Which two methods can the team use to accomplish this goal? (Choose two.)

Options:

A.  

add a new policy

B.  

clone an existing policy

C.  

disable an out-of-the-box policy

D.  

edit the query in the out-of-the-box policy

Discussion 0
Questions 41

Which two bot categories belong to unknown bots under Web-Application and API Security (WAAS) bot protection? (Choose two.)

Options:

A.  

News bots

B.  

Search engine crawlers

C.  

Web scrapers

D.  

HTTP libraries

Discussion 0
Questions 42

Which two variables must be modified to achieve automatic remediation for identity and access management (IAM) alerts in Azure cloud? (Choose two.)

Options:

A.  

API_ENDPOINT

B.  

SQS_QUEUE_NAME

C.  

SB_QUEUE_KEY

D.  

YOUR_ACCOUNT_NUMBER

Discussion 0
Questions 43

An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.

What does the administrator need to configure?

Options:

A.  

A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on WAAS

B.  

A ban for DoS protection with a burst rate of 5 and file extensions match on .tar.gz on CNNF

C.  

A ban for DoS protection with a burst rate of 5 and file extensions match on .tar gz on WAAS

D.  

A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on CNNF

Discussion 0
Questions 44

What factor is not used in calculating the net effective permissions for a resource in AWS?

Options:

A.  

AWS 1AM policy

B.  

Permission boundaries

C.  

IPTables firewall rule

D.  

AWS service control policies (SCPs)

Discussion 0
Questions 45

When an alert notification from the alarm center is deleted, how many hours will a similar alarm be suppressed by default?

Options:

A.  

12

B.  

8

C.  

24

D.  

4

Discussion 0
Questions 46

What is the frequency to create a compliance report? (Choose two.)

Options:

A.  

Weekly

B.  

One time

C.  

Monthly

D.  

Recurring

Discussion 0
Questions 47

An S3 bucket within AWS has generated an alert by violating the Prisma Cloud Default policy “AWS S3 buckets are accessible to public”. The policy definition follows:

config where cloud.type = 'aws' AND api.name='aws-s3api-get-bucket-acl' AND json.rule="((((acl.grants[? (@.grantee=='AllUsers')] size > 0) or policyStatus.isPublic is true) and publicAccessBlockConfiguration does not exist) or ((acl.grants[?(@.grantee=='AllUsers')] size > 0) and publicAccessBlockConfiguration.ignorePublicAcis is false) or (policyStatus.isPublic is true and publicAccessBlockConfiguration.restrictPublicBuckets is false)) and websiteConfiguration does not exist"

Why did this alert get generated?

Options:

A.  

an event within the cloud account

B.  

network traffic to the S3 bucket

C.  

configuration of the S3 bucket

D.  

anomalous behaviors

Discussion 0
Questions 48

Which field is required during the creation of a custom config query?

Options:

A.  

resource status

B.  

api.name

C.  

finding.type

D.  

cloud.type

Discussion 0
Questions 49

A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt. The DevOps lead only has access to vulnerability data in Prisma Cloud Compute, so the DevOps lead passes this information to SecOps.

Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?

Options:

A.  

The SecOps lead should investigate the attack using Vulnerability Explorer and Runtime Radar.

B.  

The SecOps lead should use Incident Explorer and Compliance Explorer.

C.  

The SecOps lead should use the Incident Explorer page and Monitor > Events > Container Audits.

D.  

The SecOps lead should review the vulnerability scans in the CI/CD process to determine blame.

Discussion 0
Questions 50

What improves product operationalization by adding visibility into feature utilization and missed opportunities?

Options:

A.  

Adoption Advisor

B.  

Alarm Advisor

C.  

Alert Center

D.  

Alarm Center

Discussion 0
Questions 51

Given this information:

The Console is located at https://prisma-console.mydomain.local The username is: cluster

The password is: password123

The image to scan is: myimage:latest

Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?

Options:

A.  

twistcli images scan --console-address https://prisma-console.mydomain.local -u cluster -p password123 -- details myimage:latest

B.  

twistcli images scan --console-address prisma-console.mydomain.local -u cluster -p password123 -- vulnerability-details myimage:latest

C.  

twistcli images scan --address prisma-console.mydomain.local -u cluster -p password123 --vulnerability- details myimage:latest

D.  

twistcli images scan --address https://prisma-console.mydomain.local -u cluster -p password123 --details myimage:latest

Discussion 0
Questions 52

An administrator has added a Cloud account on Prisma Cloud and then deleted it.

What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?

Options:

A.  

No alerts will be displayed.

B.  

Existing alerts will be displayed again.

C.  

New alerts will be generated.

D.  

Existing alerts will be marked as resolved.

Discussion 0
Questions 53

You wish to create a custom policy with build and run subtypes. Match the query types for each example.

(Select your answer from the pull-down list. Answers may be used more than once or not at all.)

Options:

Discussion 0
Questions 54

What happens when a role is deleted in Prisma Cloud?

Options:

A.  

The access key associated with that role is automatically deleted.

B.  

Any integrations that use the access key to make calls to Prisma Cloud will stop working.

C.  

The users associated with that role will be deleted.

D.  

Any user who uses that key will be deleted.

Discussion 0
Questions 55

Where can a user submit an external new feature request?

Options:

A.  

Aha

B.  

Help Center

C.  

Support Portal

D.  

Feature Request

Discussion 0
Questions 56

Which two offerings will scan container images in Jenkins pipelines? (Choose two.)

Options:

A.  

Compute Azure DevOps plugin

B.  

Prisma Cloud Visual Studio Code plugin with Jenkins integration

C.  

Jenkins Docker plugin

D.  

Twistcli

E.  

Compute Jenkins plugin

Discussion 0
Questions 57

An administrator has deployed Console into a Kubernetes cluster running in AWS. The administrator also has configured a load balancer in TCP passthrough mode to listen on the same ports as the default Prisma Compute Console configuration.

In the build pipeline, the administrator wants twistcli to talk to Console over HTTPS. Which port will twistcli need to use to access the Prisma Compute APIs?

Options:

A.  

8084

B.  

443

C.  

8083

D.  

8081

Discussion 0
Questions 58

Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).

Options:

A.  

Spoke Account Mode

B.  

Hub Account Mode

C.  

Same Account Mode

D.  

Main Account Mode

Discussion 0
Questions 59

Which policy type should be used to detect and alert on cryptominer network activity?

Options:

A.  

Audit event

B.  

Anomaly

C.  

Config-build

D.  

Config-run

Discussion 0
Questions 60

What are the subtypes of configuration policies in Prisma Cloud?

Options:

A.  

Build and Deploy

B.  

Monitor and Analyze

C.  

Security and Compliance

D.  

Build and Run

Discussion 0
Questions 61

How is the scope of each rule determined in the Prisma Cloud Compute host runtime policy?

Options:

A.  

By the collection assigned to that rule

B.  

By the target workload

C.  

By the order in which it is created

D.  

By the type of network traffic it controls

Discussion 0
Questions 62

Which three fields are mandatory when authenticating the Prisma Cloud plugin in the IntelliJ application? (Choose three.)

Options:

A.  

Secret Key

B.  

Prisma Cloud API URL

C.  

Tags

D.  

Access Key

E.  

Asset Name

Discussion 0
Questions 63

One of the resources on the network has triggered an alert for a Default Config policy.

Given the following resource JSON snippet:

Which RQL detected the vulnerability?

A)

B)

C)

D)

Options:

A.  

Option A

B.  

Option B

C.  

Option C

D.  

Option D

Discussion 0
Questions 64

A customer wants to be notified about port scanning network activities in their environment. Which policy type detects this behavior?

Options:

A.  

Network

B.  

Port Scan

C.  

Anomaly

D.  

Config

Discussion 0
Questions 65

You are tasked with configuring a Prisma Cloud build policy for Terraform. What type of query is necessary to complete this policy?

Options:

A.  

YAML

B.  

JSON

C.  

CloudFormation

D.  

Terraform

Discussion 0
Questions 66

Given the following information, which twistcli command should be run if an administrator were to exec into a running container and scan it from within using an access token for authentication?

• Console is located at https://prisma-console.mydomain.local

• Token is: TOKEN_VALUE

• Report ID is: REPORTJD

• Container image running is: myimage:latest

Options:

A.  

twistcli images scan --address https://prisma-console.mydomain.local —token TOKENVALUE —containerized —details myimage:latest

B.  

twistcli images scan —console-address https://prisma-console.mydomain.local —auth-token MY_TOKEN —local-scan —details myimage:latest

C.  

twistcli images scan —address https://prisma-console.mydomain.local —token TOKEN_VALUE —containerized --details REPORT_ID

D.  

twistcli images scan --console-address https://prisma-console.mydomain.local --auth-token TOKEN_VALUE —containerized —vulnerability-details REPORT_ID

Discussion 0
Questions 67

Put the steps involved to configure and scan using the IntelliJ plugin in the correct order.

Options:

Discussion 0
Questions 68

A customer has Prisma Cloud Enterprise and host Defenders deployed.

What are two options that allow an administrator to upgrade Defenders? (Choose two.)

Options:

A.  

with auto-upgrade, the host Defender will auto-upgrade.

B.  

auto deploy the Lambda Defender.

C.  

click the update button in the web-interface.

D.  

generate a new DaemonSet file.

Discussion 0
Questions 69

Match the service on the right that evaluates each exposure type on the left.

(Select your answer from the pull-down list. Answers may be used more than once or not at all.)

Options:

Discussion 0
Questions 70

A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company’s AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded individually.

The business unit has decided to cover the scope of this action and determined that a script should be written to onboard each of these accounts with general settings to gain immediate posture visibility across the accounts.

Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?

Options:

A.  

https://api.prismacloud.io/cloud/

B.  

https://api.prismacloud.io/account/aws

C.  

https://api.prismacloud.io/cloud/aws

D.  

https://api.prismacloud.io/accountgroup/aws

Discussion 0
Questions 71

How are the following categorized?

Backdoor account access Hijacked processes Lateral movement

Port scanning

Options:

A.  

audits

B.  

incidents

C.  

admission controllers

D.  

models

Discussion 0
Questions 72

Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.

Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?

Options:

A.  

From the deployment page in Console, choose pod name for Console identifier, generate DaemonSet file, and apply the DaemonSet to twistlock namespace.

B.  

From the deployment page configure the cloud credential in Console and allow cloud discovery to auto-protect the Kubernetes nodes.

C.  

From the deployment page in Console, choose twistlock-console for Console identifier, generate DaemonSet file, and apply DaemonSet to the twistlock namespace.

D.  

From the deployment page in Console, choose twistlock-console for Console identifier, and run the curl | bash script on the master Kubernetes node.

Discussion 0
Questions 73

The attempted bytes count displays?

Options:

A.  

traffic that is either denied by the security group or firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

B.  

traffic that is either denied by the security group or firewall rules.

C.  

traffic that is either denied by the firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

D.  

traffic denied by the security group or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

Discussion 0
Questions 74

Which two integrations enable ingesting host findings to generate alerts? (Choose two.)

Options:

A.  

Splunk

B.  

Tenable

C.  

JIRA

D.  

Qualys

Discussion 0
Questions 75

What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?

Options:

A.  

1

B.  

2

C.  

3

D.  

4

Discussion 0
Questions 76

Which three public cloud providers are supported for VM image scanning? (Choose three.)

Options:

A.  

GCP

B.  

Alibaba

C.  

Oracle

D.  

AWS

E.  

Azure

Discussion 0
Questions 77

Which “kind” of Kubernetes object is configured to ensure that Defender is acting as the admission controller?

Options:

A.  

MutatingWebhookConfiguration

B.  

DestinationRules

C.  

ValidatingWebhookConfiguration

D.  

PodSecurityPolicies

Discussion 0
Questions 78

Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)

Options:

A.  

Network flow

B.  

Audit

C.  

Traffic

D.  

Users

Discussion 0