質問 1:Which Prisma Cloud policy type detects port scanning activities in a customer environment?
A. Anomaly
B. Network
C. Config
D. Port Scan
正解:A
解説: (Topexam メンバーにのみ表示されます)
質問 2:What are the two ways to scope a CI policy for image scanning? (Choose two.)
A. hostname
B. image labels
C. image name
D. container name
正解:B,C
質問 3:Review this admission control policy:
match[{"msg": msg}] { input.request.operation == "CREATE" input.request.kind.kind == "Pod" input.request.resource.resource == "pods" input.request.object.spec.containers[_].securityContext.privileged msg := "Privileged"
}
Which response to this policy will be achieved when the effect is set to "block"?
A. The policy will alert only the administrator when a privileged pod is created.
B. The policy will block all pods on a Privileged host.
C. The policy will replace Defender with a privileged Defender.
D. The policy will block the creation of a privileged pod.
正解:D
解説: (Topexam メンバーにのみ表示されます)
質問 4:Given the following RQL:
event from cloud.audit_logs where operation IN ('CreateCryptoKey', 'DestroyCryptoKeyVersion','v1.compute.disks.createSnapshot')
Which audit event snippet is identified?
A. B. C.
正解:B
解説: (Topexam メンバーにのみ表示されます)
質問 5:Put the steps involved to configure and scan using the IntelliJ plugin in the correct order.
正解:
Explanation:
* Install IntelliJ IDE
* Add Prisma Cloud plugin
* Configure the Prisma Cloud plugin
* Scan using the Prisma Cloud plugin
To configure and use the Prisma Cloud plugin for scanning within the IntelliJ Integrated Development Environment (IDE), you must follow a series of steps in a specific order to ensure proper setup and functionality.
Firstly, you need to have the IntelliJ IDE installed on your system. Without the IDE, you cannot add or use the Prisma Cloud plugin, as it is designed to work within this development environment.
Secondly, after installing the IntelliJ IDE, you add the Prisma Cloud plugin. This involves navigating to the plugin marketplace within IntelliJ and selecting the Prisma Cloud plugin for installation.
Once the plugin is added to your IntelliJ IDE, the next step is to configure the Prisma Cloud plugin. This configuration may include setting up your Prisma Cloud credentials, specifying your scan options, and other settings that tailor the plugin's functionality to your needs.
Finally, after the plugin is installed and configured, you can proceed to scan your project using the Prisma Cloud plugin. This will check your code against security policies and compliance standards, providing feedback and recommendations for any identified issues.
Following these steps ensures that the Prisma Cloud plugin is properly integrated into your IntelliJ development workflow, allowing for continuous security and compliance checks as part of the development process.
質問 6:Which order of steps map a policy to a custom compliance standard?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
正解:
Explanation:
1. click on compliance standard.
2. add custom compliance standard.
3. edit policies.
4. add compliance standard from drop-down menu
https://docs.prismacloudcompute.com/docs/enterprise_edition/compliance/custom_compliance_checks.html#cre The process of mapping a policy to a custom compliance standard in a security platform like Prisma Cloud by Palo Alto Networks involves several specific steps. Firstly, one must access the compliance standards, which is typically done by clicking on the "Compliance Standards" section within the platform's interface. This is where all standards, including custom and predefined ones, are listed.
Next, if the custom compliance standard does not already exist, it must be created. This step involves defining the criteria and controls that make up the standard, tailored to the organization's specific requirements.
Once the custom compliance standard is in place, the policy in question needs to be edited. This editing process would involve configuring the policy to align with the compliance controls outlined in the custom standard, ensuring that the policy will enforce or check for the necessary requirements as defined by the standard.
Finally, the last step is to formally associate or map the edited policy with the custom compliance standard.
This is typically done by adding the policy to the standard, which may involve selecting the custom compliance standard from a drop-down menu within the policy settings, confirming that this particular policy should be enforced as part of the compliance checks for that standard.
This ordered process ensures that policies are properly aligned with the organization's compliance goals and can be enforced and reported on accurately within the security platform.
質問 7:Which two statements apply to the Defender type Container Defender - Linux?
A. It is deployed as a service.
B. It is implemented as runtime protection in the userspace.
C. It is deployed as a container.
D. It is incapable of filesystem runtime defense.
正解:B,C
解説: (Topexam メンバーにのみ表示されます)
質問 8:Which statement is true about obtaining Console images for Prisma Cloud Compute Edition?
A. To retrieve Prisma Cloud Console images using basic auth:
1.Access registry.paloaltonetworks.com, and authenticate using 'docker login'.
2.Retrieve the Prisma Cloud Console images using 'docker pull'.
B. To retrieve Prisma Cloud Console images using basic auth:
1.Access registry.twistlock.com, and authenticate using 'docker login'.
2.Retrieve the Prisma Cloud Console images using 'docker pull'.
C. To retrieve Prisma Cloud Console images using URL auth:
1.Access registry-url-auth.twistlock.com, and authenticate using the user certificate.
2.Retrieve the Prisma Cloud Console images using 'docker pull'.
D. To retrieve Prisma Cloud Console images using URL auth:
1.Access registry-auth.twistlock.com, and authenticate using the user certificate.
2.Retrieve the Prisma Cloud Console images using 'docker pull'.
正解:B
解説: (Topexam メンバーにのみ表示されます)
TopExamは君にPCCSEの問題集を提供して、あなたの試験への復習にヘルプを提供して、君に難しい専門知識を楽に勉強させます。TopExamは君の試験への合格を期待しています。
弊社は失敗したら全額で返金することを承諾します
我々は弊社のPCCSE問題集に自信を持っていますから、試験に失敗したら返金する承諾をします。我々のPalo Alto Networks PCCSEを利用して君は試験に合格できると信じています。もし試験に失敗したら、我々は君の支払ったお金を君に全額で返して、君の試験の失敗する経済損失を減少します。
一年間の無料更新サービスを提供します
君が弊社のPalo Alto Networks PCCSEをご購入になってから、我々の承諾する一年間の更新サービスが無料で得られています。弊社の専門家たちは毎日更新状態を検査していますから、この一年間、更新されたら、弊社は更新されたPalo Alto Networks PCCSEをお客様のメールアドレスにお送りいたします。だから、お客様はいつもタイムリーに更新の通知を受けることができます。我々は購入した一年間でお客様がずっと最新版のPalo Alto Networks PCCSEを持っていることを保証します。
安全的な支払方式を利用しています
Credit Cardは今まで全世界の一番安全の支払方式です。少数の手続きの費用かかる必要がありますとはいえ、保障があります。お客様の利益を保障するために、弊社のPCCSE問題集は全部Credit Cardで支払われることができます。
領収書について:社名入りの領収書が必要な場合、メールで社名に記入していただき送信してください。弊社はPDF版の領収書を提供いたします。
弊社のPalo Alto Networks PCCSEを利用すれば試験に合格できます
弊社のPalo Alto Networks PCCSEは専門家たちが長年の経験を通して最新のシラバスに従って研究し出した勉強資料です。弊社はPCCSE問題集の質問と答えが間違いないのを保証いたします。
この問題集は過去のデータから分析して作成されて、カバー率が高くて、受験者としてのあなたを助けて時間とお金を節約して試験に合格する通過率を高めます。我々の問題集は的中率が高くて、100%の合格率を保証します。我々の高質量のPalo Alto Networks PCCSEを利用すれば、君は一回で試験に合格できます。
弊社は無料Palo Alto Networks PCCSEサンプルを提供します
お客様は問題集を購入する時、問題集の質量を心配するかもしれませんが、我々はこのことを解決するために、お客様に無料PCCSEサンプルを提供いたします。そうすると、お客様は購入する前にサンプルをダウンロードしてやってみることができます。君はこのPCCSE問題集は自分に適するかどうか判断して購入を決めることができます。
PCCSE試験ツール:あなたの訓練に便利をもたらすために、あなたは自分のペースによって複数のパソコンで設置できます。
Palo Alto Networks Prisma Certified Cloud Security Engineer 認定 PCCSE 試験問題:
1. Which ban for DoS protection will enforce a rate limit for users who are unable to post five (5) ". tar.gz" files within five (5) seconds?
A) One with an average rate of 5 and file extensions match on ". tar.gz" on Cloud Native Network Firewall (CNNF)
B) One with a burst rate of 5 and file extensions match on ". tar.gz" on Web Application and API Security (WAAS) *
C) One with a burst rate of 5 and file extensions match on ". tar.gz" on Cloud Native Network Firewall (CNNF)
D) One with an average rate of 5 and file extensions match on ". tar.gz" on Web Application and API Security (WAAS)
2. A customer wants to harden its environment from misconfiguration.
Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)
A) Docker daemon configuration files
B) Host configuration
C) Docker daemon configuration
D) Hosts without Defender agents
E) Host cloud provider tags
3. What is a benefit of the Cloud Discovery feature?
A) It enables engineers to continuously monitor all accounts and report on the services that are unprotected.
B) It offers coverage for serverless functions on AWS only.
C) It does not require any specific permissions to be granted before use.
D) It helps engineers find all cloud-native services being used only on AWS.
4. A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
A) Designate a Fargate Defender to serve a dedicated image scanner
B) Use Cloud Compliance to identify misconfigured AWS accounts
C) Set up a vulnerability scanner on the registry
D) Embed a Fargate Defender to automatically scan for vulnerabilities
5. How are the following categorized?
Backdoor account access Hijacked processes Lateral movement
Port scanning
A) incidents
B) models
C) admission controllers
D) audits
質問と回答:
質問 # 1 正解: D | 質問 # 2 正解: A、B、C | 質問 # 3 正解: A | 質問 # 4 正解: C | 質問 # 5 正解: A |