Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Paloalto Networks PCCSE - Prisma Certified Cloud Security Engineer

Page: 4 / 8
Total 260 questions

When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?

A.

when a serverless repository is scanned

B.

when a Container is started form an Image

C.

when the Image is built and when a Container is started form an Image

D.

when the Image is built

Which component of a Kubernetes setup can approve, modify, or reject administrative requests?

A.

Kube Controller

B.

Terraform Controller

C.

Admission Controller

D.

Control plane

Put the steps involved to configure and scan using the IntelliJ plugin in the correct order.

The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?

A.

Ensure functions are not overly permissive.

B.

Ensure host devices are not directly exposed to containers.

C.

Ensure images are created with a non-root user.

D.

Ensure compliant Docker daemon configuration.

Which three platforms support the twistcli tool? (Choose three.)

A.

Linux

B.

Windows

C.

Android

D.

MacOS

E.

Solaris

What are two built-in RBAC permission groups for Prisma Cloud? (Choose two.)

A.

Group Membership Admin

B.

Group Admin

C.

Account Group Admin

D.

Account Group Read Only

What is the default namespace created by Defender DaemonSet during deployment?

A.

Redlock

B.

Defender

C.

Twistlock

D.

Default

Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?

A.

Host

B.

Container

C.

Functions

D.

Image

What is the behavior of Defenders when the Console is unreachable during upgrades?

A.

Defenders continue to alert, but not enforce, using the policies and settings most recently cached before upgrading the Console.

B.

Defenders will fail closed until the web-socket can be re-established.

C.

Defenders will fail open until the web-socket can be re-established.

D.

Defenders continue to alert and enforce using the policies and settings most recently cached before upgrading the Console.

What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?

A.

It is a unique identifier needed only when Monitor & Protect mode is selected.

B.

It is the resource name for the Prisma Cloud Role.

C.

It is a UUID that establishes a trust relationship between the Prisma Cloud account and the AWS account in order to extract data.

D.

It is the default name of the PrismaCloudApp stack.