Paloalto Networks CloudSec-Pro Palo Alto Networks Cloud Security Professional Exam Practice Test
Palo Alto Networks Cloud Security Professional Questions and Answers
Which of the following is a reason for alert dismissal?
Which RQL query type is invalid?
Which statement is true regarding CloudFormation templates?
Which command correctly outputs scan results to stdout in tabular format and writes scan results to a JSON file while still sending the results to Console?
Which two attributes are required for a custom config RQL? (Choose two.)
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
During the Learning phase of the Container Runtime Model, Prisma Cloud enters a “dry run” period for how many hours?
Which step should a SecOps engineer implement in order to create a network exposure policy that identifies instances accessible from any untrusted internet sources?
In Prisma Cloud Software Release 22.06 (Kepler), which Registry type is added?
What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?
The security team wants to protect a web application container from an SQLi attack. Which type of policy should the administrator create to protect the container?
Which statement applies to Adoption Advisor?
Which order of steps map a policy to a custom compliance standard?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Which component(s), if any, will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?
What are two ways to scan container images in Jenkins pipelines? (Choose two.)
An administrator has added a Cloud account on Prisma Cloud and then deleted it.
What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?
Which RQL will trigger the following audit event activity?
What is a benefit of the Cloud Discovery feature?
A customer has Prisma Cloud Enterprise and host Defenders deployed.
What are two options that allow an administrator to upgrade Defenders? (Choose two.)
An S3 bucket within AWS has generated an alert by violating the Prisma Cloud Default policy “AWS S3 buckets are accessible to public”. The policy definition follows:
config where cloud.type = 'aws' AND api.name='aws-s3api-get-bucket-acl' AND json.rule="((((acl.grants[? (@.grantee=='AllUsers')] size > 0) or policyStatus.isPublic is true) and publicAccessBlockConfiguration does not exist) or ((acl.grants[?(@.grantee=='AllUsers')] size > 0) and publicAccessBlockConfiguration.ignorePublicAcis is false) or (policyStatus.isPublic is true and publicAccessBlockConfiguration.restrictPublicBuckets is false)) and websiteConfiguration does not exist"
Why did this alert get generated?
In WAAS Access control file upload controls, which three file types are supported out of the box? (Choose three.)
An administrator of Prisma Cloud wants to enable role-based access control for Docker engine.
Which configuration step is needed first to accomplish this task?
Which data security default policy is able to scan for vulnerabilities?
Creation of a new custom compliance standard that is based on other individual custom compliance standards needs to be automated.
Assuming the necessary data from other standards has been collected, which API order should be used for this new compliance standard?
What are the two ways to scope a CI policy for image scanning? (Choose two.)
A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company’s AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded individually.
The business unit has decided to cover the scope of this action and determined that a script should be written to onboard each of these accounts with general settings to gain immediate posture visibility across the accounts.
Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?
The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely.
Which strategy should the administrator use to achieve this goal?
How does assigning an account group to an administrative user on Prisma Cloud help restrict access to resources?
A Systems Engineer is the administrator of a self-hosted Prisma Cloud console. They upgraded the console to the latest version. However, after the upgrade, the console does not show all the policies configured. Before they upgraded the console, they created a backup manually and exported it to a local drive. Now they have to install a Prisma Cloud to restore from the backup that they manually created. Which Prisma Cloud version can they can restore with the backup?
Which three elements are part of SSH Events in Host Observations? (Choose three.)
Where are Top Critical CVEs for deployed images found?
You have onboarded a public cloud account into Prisma Cloud Enterprise. Configuration Resource ingestion is visible in the Asset Inventory for the onboarded account, but no alerts are being generated for the configuration assets in the account.
Config policies are enabled in the Prisma Cloud Enterprise tenant, with those policies associated to existing alert rules. ROL statements on the investigate matching those policies return config resource results successfully.
Why are no alerts being generated?
What improves product operationalization by adding visibility into feature utilization and missed opportunities?
Which statement accurately characterizes SSO Integration on Prisma Cloud?
Which step is included when configuring Kubernetes to use Prisma Cloud Compute as an admission controller?
What are two built-in RBAC permission groups for Prisma Cloud? (Choose two.)
How is the scope of each rule determined in the Prisma Cloud Compute host runtime policy?
While writing a custom RQL with array objects in the investigate page, which type of auto-suggestion a user can leverage?
An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query programmatically the existing users, and the user’s associated permission levels, in a Prisma Cloud Enterprise tenant.
Which public documentation location should be reviewed to help determine the required attributes to carry out this step?
What should be used to associate Prisma Cloud policies with compliance frameworks?
A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80.
Which port should the team specify in the CNAF rule to protect the application?
Which two integrated development environment (IDE) plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to YAML.
Console Address: $CONSOLE_ADDRESS Websocket Address: $WEBSOCKET_ADDRESS User: $ADMIN_USER
Which command generates the YAML file for Defender install?
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
Which action must be taken to enable a user to interact programmatically with the Prisma Cloud APIs and for a nonhuman entity to be enabled for the access keys?
An organization wants to be notified immediately to any “High Severity” alerts for the account group “Clinical Trials” via Slack.
Which option shows the steps the organization can use to achieve this goal?
Which two information types cannot be seen in the data security dashboard? (Choose two).
Which three public cloud providers are supported for VM image scanning? (Choose three.)
Which action would be applicable after enabling anomalous compute provisioning?
Which two required request headers interface with Prisma Cloud API? (Choose two.)
A container and image compliance rule has been configured by enabling all checks; however, upon review, the container's compliance view reveals only the entries in the image below.
What is the appropriate action to take next?
A customer has serverless functions that are deployed in multiple clouds.
Which serverless cloud provider is covered be “overly permissive service access” compliance check?
Which statement is true about obtaining Console images for Prisma Cloud Compute Edition?
Which two fields are required to configure SSO in Prisma Cloud? (Choose two.)
Which option shows the steps to install the Console in a Kubernetes Cluster?
Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?
When an alert notification from the alarm center is deleted, how many hours will a similar alarm be suppressed by default?
What is the default namespace created by Defender DaemonSet during deployment?
Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.
Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?
The compliance team needs to associate Prisma Cloud policies with compliance frameworks. Which option should the team select to perform this task?
Which RQL query will help create a custom identity and access management (1AM) policy to alert on Lambda functions that have permission to terminate EC2 instances?
Which two statements are true about the differences between build and run config policies? (Choose two.)
Which policy type in Prisma Cloud can protect against malware?
Which options show the steps required after upgrade of Console?
Given the following RQL:
event from cloud.audit_logs where operation IN (‘CreateCryptoKey’, ‘DestroyCryptoKeyVersion’, ‘v1.compute.disks.createSnapshot’)
Which audit event snippet is identified?
A)
B)
C)
D)
Which two roles have access to view the Prisma Cloud policies? (Choose two.)
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
Move the steps to the correct order to set up and execute a serverless scan using AWS DevOps.
The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.
Which type of policy should be created to protect this pod from Layer7 attacks?
During an initial deployment of Prisma Cloud Compute, the customer sees vulnerabilities in their environment.
Which statement correctly describes the default vulnerability policy?
Which option identifies the Prisma Cloud Compute Edition?
Which two CI/CD plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
Which data storage type is supported by Prisma Cloud Data Security?
An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type A”.
Why would this message appear as an audit?
In Azure, what permissions need to be added to Management Groups to allow Prisma Cloud to calculate net effective permissions?
An administrator has access to a Prisma Cloud Enterprise.
What are the steps to deploy a single container Defender on an ec2 node?


Graphical user interface, text, application Description automatically generated