Exam Code : PCCSE
Exam Name : Prisma Certified Cloud Security Engineer
Vendor Name :
"Palo-Alto"
PCCSE Dumps PCCSE Braindumps PCCSE Real Questions PCCSE Practice Test
PCCSE Actual Questions
Prisma Certified Cloud Security Engineer
https://killexams.com/pass4sure/exam-detail/PCCSE
Question: 65
DRAG DROP
You wish to create a custom policy with build and run subtypes. Match the query types for each example.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
Question: 66
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
add a new runtime policy targeted at a specific Container name, add ransomWare process into the denied process list and set the action to "prevent".
choose "copy into rule" for the Container add a ransomWare process into the denied process list and set the action to "block"
set the Container model to manual relearn and set the default runtime rule to block for process protection.
set the Container model to relearn and set the default runtime rule to prevent for process protection.
Question: 67
The security team wants to target a CMAF policy for specific running Containers How should the administrator scope the policy to target the Containers?
scope the policy to Image names
scope the policy to namespaces
scope the policy to Defender names.
scope the policy to Host names
Question: 68
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?
Download and extract the release tarball
Ensure that each node has it own storage for Console data Create the Console task definition
Deploy the task definition
Download and extract release tarball Download task from AWS
Create the Console task definition Deploy the task definition
The console cannot natively run in an ECS cluster. A onebox deployment should be used.
Download and extract the release tarball
Create an EPS file system and mount to each node in the cluster Create the Console task definition
Deploy the task definition
Question: 69
Which two statements are true about the differences between build and run config policies? (Choose two.)
Build and Audit Events policies belong to the configuration policy set
Run policies monitor resources, and check for potential issues after these cloud resources are deployed
Run policies monitor network activities in your environment, and check for potential issues during runtime.
Build policies enable you to check for security misconfigurations in the laC templates and ensure that these issues do not get into production.
Run and Network policies belong to the configuration policy set
Answer: A,C
Question: 70 DRAG DROP
What is the order of steps to create a custom network policy?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Question: 71
DRAG DROP
Which order of steps map a policy to a custom compliance standard?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Question: 72
Given this information:
•. The Console is located at https//prisma-console mydomain local
•. The username is ciuser
•. The password is password123
•. The Image to scan is myimage latest
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
twistcli images scan ―console-address https //prisma-console mydomain local -u ciuser -p password123 -details myimage latest
twistcli images scan ―address prisma-console mydomain local -u ciuser -p password123 -vulnerability-details myimage latest
twistcli images scan -address https //prisma-console mydomain local -u ciuser -p password123 -details myimage latest
twistcli images scan ―console-address prisma-console mydomain local -u ciuser -p password!23 -vulnerability- details myimage.latest
Question: 73
Which options show the steps required after upgrade of Console?
Update the Console image in the Twistlock hosted registry Update the Defender image in the Twistlock hosted registry Uninstall Defenders
Update the Console image in the Twistlock hosted registry Update the Defender image in the Twistlock hosted registry Redeploy Console
Upgrade Defenders Upgrade Jenkins Plugin
Upgrade twistcli where applicable
Uninstall Defenders Upgrade Jenkins Plugin
Upgrade twistcli where applicable
Allow the Console to redeploy the Defender
Question: 74
Which "kind" of Kubernetes object that is configured to ensure that Defender is acting as the admission controller?
PodSecurityPolicies
DestinationRules
ValidatingWebhookConfiguration
MutatingWebhookConfiguration
Question: 75
Which component(s), if any will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?
Defenders
twistcli
Console
Jenkins
Answer: B
Question: 76 DRAG DROP
Match the service on the right that evaluates each exposure type on the left.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
Question: 77
Which three types of bucket exposure are available in the Data Security module? (Choose three.)
Differential
Public
Conditional
Private
International