New Year Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

Paloalto Networks CloudSec-Pro - Palo Alto Networks Cloud Security Professional

Page: 3 / 8
Total 258 questions

The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?

A.

Ensure functions are not overly permissive.

B.

Ensure host devices are not directly exposed to containers.

C.

Ensure images are created with a non-root user.

D.

Ensure compliant Docker daemon configuration.

A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?

A.

They can deploy any type of container defender to scan this registry.

B.

There are Windows host defenders deployed in your environment already.

C.

There are Windows host defenders deployed in your environment already. Therefore, they do not need to deploy any additional defenders.

D.

A defender is not required to configure this type of registry scan.

What are the two ways to scope a CI policy for image scanning? (Choose two.)

A.

container name

B.

image name

C.

hostname

D.

image labels

The exclamation mark on the resource explorer page would represent?

A.

resource has been deleted

B.

the resource was modified recently

C.

resource has alerts

D.

resource has compliance violation

A customer has a requirement to automatically protect all Lambda functions with runtime protection. What is the process to automatically protect all the Lambda functions?

A.

Configure a function scan policy from the Defend/Vulnerabilities/Functions page.

B.

Configure serverless radar from the Defend/Compliance/Cloud Platforms page.

C.

Configure a manually embedded Lambda Defender.

D.

Configure a serverless auto-protect rule for the functions.

A container and image compliance rule has been configured by enabling all checks; however, upon review, the container's compliance view reveals only the entries in the image below.

What is the appropriate action to take next?

A.

Deploy defenders to scan complete container compliance.

B.

Wait until Prisma Cloud finishes the compliance scan and recheck.

C.

Change the rule options to list both failed and passed checks in the compliance rule edit window.

D.

Change the rule options to list only failed checks in the compliance rule edit window.

Under which tactic is “Exploit Public-Facing Application” categorized in the ATT&CK framework?

A.

Defense Evasion

B.

Initial Access

C.

Execution

D.

Privilege Escalation

Move the steps to the correct order to set up and execute a serverless scan using AWS DevOps.

A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.

How should the administrator configure Prisma Cloud Compute to satisfy this requirement?

A.

set the Container model to manual relearn and set the default runtime rule to block for process protection.

B.

set the Container model to relearn and set the default runtime rule to prevent for process protection.

C.

add a new runtime policy targeted at a specific Container name, add ransomWare process into the denied process list, and set the action to “prevent”.

D.

choose “copy into rule” for the Container, add a ransomWare process into the denied process list, and set the action to “block”.

Which two bot categories belong to unknown bots under Web-Application and API Security (WAAS) bot protection? (Choose two.)

A.

News bots

B.

Search engine crawlers

C.

Web scrapers

D.

HTTP libraries