CloudSec-Pro Palo Alto Networks Cloud Security Professional Questions and Answers
Which three actions are available for the container image scanning compliance rule? (Choose three.)
How are the following categorized?
Backdoor account access Hijacked processes Lateral movement
Port scanning
An administrator of Prisma Cloud wants to enable role-based access control for Docker engine.
Which configuration step is needed first to accomplish this task?
Which statement is true about obtaining Console images for Prisma Cloud Compute Edition?
A customer wants to monitor the company’s AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now.
Which two pieces of information do you need to onboard this account? (Choose two.)
Which three public cloud providers are supported for VM image scanning? (Choose three.)
Which two bot categories belong to unknown bots under Web-Application and API Security (WAAS) bot protection? (Choose two.)
Which two CI/CD plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.).
An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query programmatically the existing users, and the user’s associated permission levels, in a Prisma Cloud Enterprise tenant.
Which public documentation location should be reviewed to help determine the required attributes to carry out this step?
A customer has a requirement to scan serverless functions for vulnerabilities.
What is the correct option to configure scanning?
Which two integrated development environment (IDE) plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?
Given the following information, which twistcli command should be run if an administrator were to exec into a running container and scan it from within using an access token for authentication?
• Console is located at https://prisma-console.mydomain.local
• Token is: TOKEN_VALUE
• Report ID is: REPORTJD
• Container image running is: myimage:latest
The security team wants to enable the “block” option under compliance checks on the host.
What effect will this option have if it violates the compliance check?
In which two ways can Prisma Cloud images be retrieved in Prisma Cloud Compute Self-Hosted Edition? (Choose two.)
What are two key requirements for integrating Okta with Prisma Cloud when multiple Amazon Web Services (AWS) cloud accounts are being used? (Choose two.)
Which three elements are part of SSH Events in Host Observations? (Choose three.)
What must be created in order to receive notifications about alerts generated when the operator is away from the Prisma Cloud Console?
Which three serverless runtimes are supported by Prisma Cloud for vulnerability and compliance scans? (Choose three.)
A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?
Which two frequency options are available to create a compliance report within the console? (Choose two.)
What is required for Prisma Cloud to successfully execute auto-remediation commands?
Which ROL query is used to detect certain high-risk activities executed by a root user in AWS?
Which resource and policy type are used to calculate AWS Net Effective Permissions? (Choose two.)
Which “kind” of Kubernetes object is configured to ensure that Defender is acting as the admission controller?
A customer has Prisma Cloud Enterprise and host Defenders deployed.
What are two options that allow an administrator to upgrade Defenders? (Choose two.)
Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts.
Where can the administrator locate this list of e-mail recipients?
Which API calls can scan an image named myimage: latest with twistcli and then retrieve the results from Console?
Which two of the following are required to be entered on the IdP side when setting up SSO in Prisma Cloud? (Choose two.)
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
What is the behavior of Defenders when the Console is unreachable during upgrades?
Prisma Cloud Compute has been installed on Onebox. After Prisma Cloud Console has been accessed. Defender is disconnected and keeps returning the error "No console connectivity" in the logs.
What could be causing the disconnection between Console and Defender in this scenario?
The Compute Console has recently been upgraded, and the administrator plans to delay upgrading the Defenders and the Twistcli tool until some of the team’s resources have been rescaled. The Console is currently one major release ahead.
What will happen as a result of the Console upgrade?
A customer does not want alerts to be generated from network traffic that originates from trusted internal networks.
Which setting should you use to meet this customer’s request?
An administrator needs to detect and alert on any activities performed by a root account.
Which policy type should be used?
Which three types of classifications are available in the Data Security module? (Choose three.)
A customer wants to monitor its Amazon Web Services (AWS) accounts via Prisma Cloud, but only needs the resource configuration to be monitored at present.
Which two pieces of information are needed to onboard this account? (Choose two.)
A customer has serverless functions that are deployed in multiple clouds.
Which serverless cloud provider is covered be “overly permissive service access” compliance check?
Which file extension type is supported for Malware scanning in Prisma Cloud Data Security (PCDS)?
A customer is interested in PCI requirements and needs to ensure that no privilege containers can start in the environment.
Which action needs to be set for “do not use privileged containers”?
Which Prisma Cloud policy type detects port scanning activities in a customer environment?
Which policy type provides information about connections from suspicious IPs in a customer database?
The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely.
Which strategy should the administrator use to achieve this goal?
Which role must be assigned to DevOps users who need access to deploy Container and Host Defenders in Compute?
A security team notices a number of anomalies under Monitor > Events. The incident response team works with the developers to determine that these anomalies are false positives.
What will be the effect if the security team chooses to Relearn on this image?
Which three Orchestrator types are supported when deploying Defender? (Choose three.)
The development team wants to fail CI jobs where a specific CVE is contained within the image. How should the development team configure the pipeline or policy to produce this outcome?
A Systems Engineer is the administrator of a self-hosted Prisma Cloud console. They upgraded the console to the latest version. However, after the upgrade, the console does not show all the policies configured. Before they upgraded the console, they created a backup manually and exported it to a local drive. Now they have to install a Prisma Cloud to restore from the backup that they manually created. Which Prisma Cloud version can they can restore with the backup?
Which two services require external notifications to be enabled for policy violations in the Prisma Cloud environment? (Choose two.)
The administrator wants to review the Console audit logs from within the Console.
Which page in the Console should the administrator use to review this data, if it can be reviewed at all?
An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant.
In which order will the APIs be executed for this service?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?
Which two statements are true about the differences between build and run config policies? (Choose two.)
In Azure, what permissions need to be added to Management Groups to allow Prisma Cloud to calculate net effective permissions?
What improves product operationalization by adding visibility into feature utilization and missed opportunities?
Which three options are selectable in a CI policy for image scanning with Jenkins or twistcli? (Choose three.)
Order the steps involved in onboarding an AWS Account for use with Data Security feature.
The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.
Which type of policy should be created to protect this pod from Layer7 attacks?
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?

