This page was exported from Exams Labs Braindumps [ http://blog.examslabs.com ] Export date:Sat Nov 23 10:50:05 2024 / +0000 GMT ___________________________________________________ Title: [Dec-2023] PCCSE Exam Questions and Valid PCCSE Dumps PDF [Q59-Q82] --------------------------------------------------- [Dec-2023] PCCSE Exam Questions and Valid PCCSE Dumps PDF PCCSE Brain Dump: A Study Guide with Tips & Tricks for passing Exam The PCCSE certification is recognized globally and is highly valued by top organizations that leverage the Prisma Cloud platform. Prisma Certified Cloud Security Engineer certification is an indication that the holder has the necessary skills and knowledge to design, deploy, and manage cloud security solutions using the Prisma Cloud platform. It also demonstrates that the holder is committed to continuous learning and professional development.   Q59. Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?  Download and extract the release tarballEnsure that each node has it own storage for Console dataCreate the Console task definitionDeploy the task definition  Download and extract release tarballDownload task from AWSCreate the Console task definitionDeploy the task definition  The console cannot natively run in an ECS cluster.A onebox deployment should be used.  Download and extract the release tarballCreate an EPS file system and mount to each node in the clusterCreate the Console task definitionDeploy the task definition Q60. A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80.Which port should the team specify in the CNAF rule to protect the application?  443  80  8080  8888 Q61. Which two variables must be modified to achieve automatic remediation for identity and access management (IAM) alerts in Azure cloud? (Choose two.)  SQS_QUEUE_NAME  SB_QUEUE_KEY  YOUR_ACCOUNT_NUMBER  API_ENDPOINT Q62. What is the order of steps in a Jenkins pipeline scan?(Drag the steps into the correct order of occurrence, from the first step to the last.) ExplanationTable Description automatically generated with medium confidenceQ63. Which statement accurately characterizes SSO Integration on Prisma Cloud?  Prisma Cloud supports IdP initiated SSO, and its SAML endpoint supports the POST and GET methods.  Okta, Azure Active Directory, PingID, and others are supported via SAML.  An administrator can configure different Identity Providers (IdP) for all the cloud accounts that Prisma Cloud monitors.  An administrator who needs to access the Prisma Cloud API can use SSO after configuration. Q64. Which field is required during the creation of a custom config query?  cloud.type  resource status  finding.type  api.name Q65. An administrator has a requirement to ingest all Console and Defender logs to Splunk.Which option will satisfy this requirement in Prisma Cloud Compute?  Enable the API settings for logging.  Enable the CSV export in the Console.  Enable the syslog option in the Console  Enable the Splunk option in the Console. Q66. Which file extension type is supported for Malware scanning in Prisma Cloud Data Security (PCDS)?  .vb  .apk  .bat  .py Q67. Which “kind” of Kubernetes object that is configured to ensure that Defender is acting as the admission controller?  PodSecurityPolicies  DestinationRules  ValidatingWebhookConfiguration  MutatingWebhookConfiguration Q68. What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?  Go to Settings > Data > Data Patterns, search for SSN Pattern, edit it, and modify the proximity keywords.  Go to Policies > Data > Clone > Modify Objects containing Financial Information publicly exposed and change the file exposure to Private.  Go to Settings > Data > Snippet Masking and select Full Mask.  Go to Settings > Cloud Accounts > Edit Cloud Account > Assign Account Group and select a group with limited permissions. Q69. What are the two ways to scope a CI policy for image scanning? (Choose two.)  container name  image name  hostname  image labels Q70. A customer is interested in PCI requirements and needs to ensure that no privilege containers can start in the environment.Which action needs to be set for “do not use privileged containers”?  Alert  Fail  Block  Prevent Block-Defender stops the entire container if a process that violates your policy attempts to run.https://docs.prismacloudcompute.com/docs/enterprise_edition/runtime_defense/runtime_defense_containers.html#_effectQ71. The security team wants to target a CMAF policy for specific running Containers How should the administrator scope the policy to target the Containers?  scope the policy to Image names  scope the policy to namespaces  scope the policy to Defender names.  scope the policy to Host names Q72. A customer finds that an open alert from the previous day has been resolved. No auto-remediation was configured.Which two reasons explain this change in alert status? (Choose two.)  user manually changed the alert status.  policy was changed.  resource was deleted.  alert was sent to an external integration. Q73. What is the order of steps in a Jenkins pipeline scan?(Drag the steps into the correct order of occurrence, from the first step to the last.) Q74. Which component(s), if any, will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?  Defenders  Console  Jenkins  twistcli Q75. Which two attributes of policies can be fetched using API? (Choose two.)  policy label  policy signature  policy mode  policy violation Q76. What is the order of steps to create a custom network policy?(Drag the steps into the correct order of occurrence, from the first step to the last.) Reference:https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/create-a- policy.htmlQ77. An administrator needs to write a script that automatically deactivates access keys that have not been used for30 days.In which order should the API calls be used to accomplish this task? (Drag the steps into the correct order from the first step to the last.) Select and Place: ExplanationA picture containing graphical user interface Description automatically generatedQ78. Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)  Remove Defenders DaemonSet, and then use Cloud Discovery to automatically redeploy the Defenders.  Let Defenders automatically upgrade.  Run the provided curl | bash script from Console to remove Defenders, and then use Cloud Discovery to automatically redeploy Defenders.  Remove Defenders, and then deploy the new DaemonSet so Defenders do not have to automatically update on each deployment. Q79. A Prisma Cloud administrator is onboarding a single GCP project to Prisma Cloud. Which two steps can be performed by the Terraform script? (Choose two.)  enable the required APIs for Prisma Cloud  enable flow logs for Prisma Cloud.  publish the flow log to a storage bucket  create the Prisma Cloud role Q80. Which of the following is displayed in the asset inventory?  Federated users  EC2 instances  Asset tags  SSO users Q81. In Prisma Cloud Software Release 22.06 (Kepler), which Registry type is added?  Sonatype Nexus  Google Artifact Registry  Azure Container Registry  IBM Cloud Container Registry Q82. Which statement is true about obtaining Console images for Prisma Cloud Compute Edition?  To retrieve Prisma Cloud Console images using basic auth:1.Access registry.paloaltonetworks.com, and authenticate using ‘docker login’.2.Retrieve the Prisma Cloud Console images using ‘docker pull’.  To retrieve Prisma Cloud Console images using basic auth:1.Access registry.twistlock.com, and authenticate using ‘docker login’.2.Retrieve the Prisma Cloud Console images using ‘docker pull’.  To retrieve Prisma Cloud Console images using URL auth:1.Access registry-url-auth.twistlock.com, and authenticate using the user certificate.2.Retrieve the Prisma Cloud Console images using ‘docker pull’.  To retrieve Prisma Cloud Console images using URL auth:1.Access registry-auth.twistlock.com, and authenticate using the user certificate.2.Retrieve the Prisma Cloud Console images using ‘docker pull’.  Loading … PCCSE Exam Questions: Free PDF Download Recently Updated Questions: https://www.examslabs.com/Palo-Alto-Networks/Cloud-Security-Engineer/best-PCCSE-exam-dumps.html --------------------------------------------------- Images: https://blog.examslabs.com/wp-content/plugins/watu/loading.gif https://blog.examslabs.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-12-07 16:50:23 Post date GMT: 2023-12-07 16:50:23 Post modified date: 2023-12-07 16:50:23 Post modified date GMT: 2023-12-07 16:50:23