PANW PCCSE Practice Questions Flashcards
Which registry do you use to download the Prisma Cloud Compute Defender image?
registry. redlock.com
registry. twistlock.com
registry. prisma.com
registry. paloaltonetworks.com
registry.twistlock.com
What is a valid tag for a Prisma Cloud Compute Docker image?
defender_20.04.177
defender.20.04.177
defender_20_04_177
defender-20-04-177
defender_20_04_177
An organization that uses a private cloud in a black site that has no internet connection can use which product?
Google Cloud AWS S3 Management. Prisma Cloud Compute Prisma Cloud
Prisma Cloud Compute
In Prisma Cloud Compute, what is the default HTTPS port for the Console? 443 8083 8443 9443
8083
What is the name of the configuration file that controls a Onebox configuration? twistlock.cfg twistlock.json redlock.cfg redlock.json
twistlock.cfg
In which format does the twistcli create the configuration file for the Console when using Kubernetes? JSON YAML XML CSV
YAML
What are the two external items that need to be deployed in Kubernetes together with a console? (Choose two.) a database (DB) to store the console’s state a load balancer, which is used to expose the console to the network an ephemeral volume (EV) for the console’s temporary data a Kubernetes authorization engine to make sure only authorized administrators use the console a persistent volume (PV) to store the console’s state
a load balancer, which is used to expose the console to the network a persistent volume (PV) to store the console’s state
What is the procedure to upgrade a non-SaaS Prisma Cloud Compute implementation? manually upgrade the console, then manually upgrade the Defenders manually upgrade the Defenders, then manually upgrade the console manually upgrade the console, which then automatically upgrades the Defenders manually upgrade both the console and Defenders in any order
manually upgrade the console, which then automatically upgrades the Defenders
Which command do you use to upgrade the console in Kubernetes? kubectl apply -f twistlock_console.yaml kubectl upgrade -f twistlock_console.yaml twistcli apply -f kubectl.yaml twiscli upgrade -f kuberctl.yaml
kubectl apply -f twistlock_console.yaml
Which command do you use to install a container Defender on Linux? rpm apt install either rpm or apt install, depending on the Linux distribution curl
curl
How does the Docker Defender receive information from the console? Pull, the Docker Defender connects to the console using TCP to ask for the information. Pull, the Docker Defender connects to the console using UDP to ask for the information. Push, the Docker Defender listens on a TCP port to receive information from the console. Push, the Docker Defender listens on a UDP port to receive information from the console.
Pull, the Docker Defender connects to the console using TCP to ask for the information.
The TCP listener setting in a Docker Defender running on Linux allows the Defender to function as what? a firewall a Docker proxy an SSH proxy an HTTP proxy
a Docker proxy
Where do you install the Docker Defender? on the hosts that run the Docker containers of the application on the images that become the Docker containers of the application on the Docker containers that implement the application on both the hosts and the images
on the hosts that run the Docker containers of the application
How do you deploy a host Defender on Windows? Download an .msi package using the browser. Run the provided command line using the old (cmd.exe) shell. Run the provided command line using PowerShell. Download an .exe command package using the browser.
Run the provided command line using PowerShell.
Which two versions of Windows support the host Defender? (Choose two.) Windows 10 Windows 2016 Windows 2017 Windows 2019
Windows 2016 Windows 2019
Which version of Windows supports the host Defenders runtime defense functionality? Windows 10 Windows 2016 Windows 2017 Windows 2019
Windows 2019
Which serverless platform is supported by the serverless layer deployment type? AWS Lambda GCP Cloud GCP On-Premises Azure
AWS Lambda
Which three runtimes are supported by the serverless Defender? (Choose four.) PowerShell Ruby Node.js C# Python
Ruby Node.js C# Python
Which three serverless platforms are supported by the serverless embedded deployment type? (Choose three.) AWS Lambda GCP Cloud Functions GCP On-Premises Azure Functions Google App Engine
AWS Lambda GCP Cloud Functions Azure Functions
Where do you install an app-embedded Defender? on the hosts that run the Docker containers of the application on the images that become the Docker containers of the application on the Docker containers that implement the application on both the hosts and the images
on the images that become the Docker containers of the application
Which option is not a way to deploy an app-embedded Defender? (Check console) Fargate Dockerfile Shell script manual
Shell script
How do alerts propagate from the Defenders to the Console in Kubernetes? (Check diagram) Pull, the console connects to port 8083 on the Defender. Pull, the console connects to port 8084 on the Defender. Push, the Defender connects to port 8083 on the console. Push, the Defender connects to port 8084 on the console.
Push, the Defender connects to port 8084 on the console.
What is the usual order of upgrades if you use a self-hosted console in Prisma Cloud Compute? The console identifies that there’s a new version, upgrades itself automatically, and then upgrades the Defenders automatically. The console identifies that there’s a new version and upgrades itself automatically. You then upgrade the Defenders manually during a scheduled maintenance window. You upgrade the console manually, and then it upgrades the Defenders automatically. You upgrade both the console and Defenders manually.
You upgrade the console manually, and then it upgrades the Defenders automatically.
Can Defender upgrades be restricted to a specific window of time? No. Upgrades happen automatically. However, those upgrades do not cause downtime. You can disable auto-upgrade, but then you can’t upgrade the Defenders. You need to uninstall and reinstall them for the upgrade. You can disable auto-upgrade, and then upgrade the Defenders during the window from the web-based interface. You can specify the maintenance window in the console, and then Defender upgrades will happen only during that time.
You can disable auto-upgrade, and then upgrade the Defenders during the window from the web-based interface.
How many queries can a policy include? How many standards? one query, one standard one query, multiple standards multiple queries, one standard multiple queries, multiple standards
one query, multiple standards
Which three protocols are identified by the following RQL query? (Choose three.) protocol=’TCP’ AND dest.port IN (21,23,80) AND source.publicnetwork IN ( ‘Internet IPs’ , ‘Suspicious IPs’ ) HTTP Telnet SSH HTTPS FTP
HTTP Telnet FTP
Which parameter can you use in RQL to look at a field that Prisma Cloud does not parse? config.external json.value json.rule config.internal
json.rule
Which of the following is not a Prisma Cloud policy category? Config Network Anomaly Audit Event
Network
Which two Prisma Cloud policy categories allow you to be reactive, but not proactive? (Choose two.) Config Network Anomaly Audit Event User Activity
Network Audit Event
What is the alert state after the next scan when Prisma Cloud detects that excessive access was allowed to an AWS S3 bucket? Open Resolved Closed Deleted
Resolved
Which two alert states would be used by an administrator that is trying to hide the alerts caused by their actions? (Choose two.) Open Resolved Snoozed Dismissed Closed
Resolved Snoozed
Which option shows the targets that an alert rule-checks? policies users cloud accounts account groups
account groups
Which request type do web hooks use? GET POST PUT ALERT
POST
Which two integrations can send alerts to a system that is behind dynamic source-address translation? (Choose two.) Tenable Webhooks Email Qualys Slack
Tenable, Qualys
How should an administrator respond to an alert opened at 2 a.m. and resolved at 4 a.m? Verify the Alert log file to gather additional information to investigate the occurrence in detail. Investigate further. Somebody may have disabled a safeguard at 2 a.m., committed a crime, and re-enabled it at 4 a.m. to avoid detection. Evidence of malware is clear. The administrator must shut down the system in which it occurred. Document the incident. If it happens multiple times it needs to be investigated.
Investigate further. Somebody may have disabled a safeguard at 2 a.m., committed a crime, and re-enabled it at 4 a.m. to avoid detection.
An alarm resulted from device A connecting to device B. Which device should you investigate first? Device A Device B The network firewalls The device that contains more valuable information
Device A
In which format are alert details provided to accepting systems? XML JSON CSV HTTP
XML
Which is not a field in the alert notification? accountName policyLabels riskLevel alertRemediationCli
riskLevel
What does this query mean on GCP? api.name=’gcloud-sql-instances-list’ and json.rule = ‘settings.ipConfiguration.requireSsl is true’. list instances where SSL is configured list instances where SSL is not configured list SQL instances where SSL is configured list SQL instances where SSL is not configured
list SQL instances where SSL is configured
This query looks for which type of S3 buckets with rules? api.name=’aws-s3api-get-bucket-acl’ AND json.rule=”(acl.grants[?(@.grantee==’AllUsers’)] size> 0)”. allow access to all users deny access to all users allow access to some external users deny access to some external users
Allow access to all users
You suspect that the desktop at IP 6.6.6.6 has malware. Which event query will show whether malware performed any cloud activity on your instances? event where sourceIP IN ( 6.6.6.6 ) event where ip IN ( 6.6.6.6 ) event where inetIP IN ( 6.6.6.6 ) event where adminIP IN ( 6.6.6.6 )
event where ip IN ( 6.6.6.6 )
You type this query: event where user = ‘root’. Where would the events you see originate? AWS Azure GCP Google Cloud
AWS
You suspect that the desktop at 6.6.6.6 has malware. Which two queries will show whether it contacted any suspicious IPs? (Choose two.) network where source.ip = 6.6.6.6 AND dest.publicnetwork = ‘Suspicious IPs’ network where source.ip = 6.6.6.6 AND dest.ip IN (‘Suspicious IPs’) network where source.publicnetwork = ‘Suspicious IPs’ AND dest.ip = 6.6.6.6 network where source.ip = ‘Suspicious IPs’ AND dest.ip = 6.6.6.6 network where source.ip = 6.6.6.6 OR dest.ip = 6.6.6.6
network where source.ip = 6.6.6.6 AND dest.publicnetwork = ‘Suspicious IPs’ network where source.publicnetwork = ‘Suspicious IPs’ AND dest.ip = 6.6.6.6
Which traffic will the following query identify? dest.resource IN ( resource where virtualnetwork.name != ‘default’ ) IP addresses of resources that are in the virtual network default IP addresses of resources that are not in the virtual network default traffic events where the destination is in the virtual network default traffic events where the destination is not in the virtual network default
traffic events where the destination is not in the virtual network default
What is a valid anomaly type? too many login attempts impossible time travel new device excessive login failures
impossible time travel
Which is a valid anomaly type for a device? digital fingerprint retinal scan MAC address IP address
digital fingerprint
In a Prisma Cloud asset inventory, which is not an option for the Assets by Classification widget? Cloud Type (AWK, Alibaba Cloud, GCP, Azure) Asset Type (Instance, Network, Database, etc.) Account Name Region
Asset Type (Instance, Network, Database, etc.)
Which two criteria can be used to filter the asset inventory? (Choose two.) Resource Type CIDR Network Block Resource Name Standard IP Type (Internal vs. External)
Resource Type Standard
Which two template types are supported by build rules? (Choose two.) JavaScript CloudFormation Bash scripts with configuration commands Terraform XML
CloudFormation Terraform
Which type of query do you use to validate that a build policy is being followed? SQL query JavaScript code to calculate the answer RQL JSON query
JSON query
Your auditor wants a weekly report of how compliant you were with SOC 2. Can you do it, and if so how? No. You can get only current compliance. You can automate it from the web interface. Do a GET https://api.prismacloud.io/compliance/posture?timeType=relative&timeAmount=< >&timeUnit=week&policy.complianceStandard=SOC%202, loop on <> Do a GET https://api.prismacloud.io/compliance/SOC 2?timeType=relative&timeAmount=<>_weeks, loop on <>
Do a GET https://api.prismacloud.io/compliance/posture?timeType=relative&timeAmount=< >&timeUnit=week&policy.complianceStandard=SOC%202, loop on <>
How can you delete Audit log entries older than a year? Audit log entries are not under administrator control. You can do it from the web interface. Do a DELETE https://api.prismacloud.io/audit/redlock?timeType=relative&timeAmount=1&time Unit=year Do a DELETE https://api.prismacloud.io/audit/redlock?timeType=absolute&time=<>
Audit log entries are not under administrator control.
Which format do you use with a config search? RQL SQL JSON query XML query
RQL
Which HTTP method do you use with an event search? GET PUT POST HEAD
POST
Which of these is not a tab in the registry details for a Docker image? Layers Process Info Network Connections Packages
Network Connections