Spring Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CloudSec-Pro Questions and Answers

Question # 6

Which policy type in Prisma Cloud can protect against malware?

A.

Data

B.

Config

C.

Network

D.

Event

Full Access
Question # 7

Which option shows the steps to install the Console in a Kubernetes Cluster?

A.

Download the Console and Defender image Generate YAML for DefenderDeploy Defender YAML using kubectl

B.

Download and extract release tarball Generate YAML for ConsoleDeploy Console YAML using kubectl

C.

Download the Console and Defender image Download YAML for Defender from the document site Deploy Defender YAML using kubectl

D.

Download and extract release tarball Download the YAML for Console Deploy Console YAML using kubectl

Full Access
Question # 8

A customer wants to harden its environment from misconfiguration.

Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)

A.

Docker daemon configuration files

B.

Docker daemon configuration

C.

Host cloud provider tags

D.

Host configuration

E.

Hosts without Defender agents

Full Access
Question # 9

Which of the following is not a supported external integration for receiving Prisma Cloud Code Security notifications?

A.

Splunk

B.

Cortex XSOAR

C.

Microsoft Teams

D.

ServiceNow

Full Access
Question # 10

Which of the following is displayed in the asset inventory?

A.

EC2 instances

B.

Asset tags

C.

SSO users

D.

Federated users

Full Access
Question # 11

Which two frequency options are available to create a compliance report within the console? (Choose two.)

A.

One-time

B.

Monthly

C.

Recurring

D.

Weekly

Full Access
Question # 12

Which two integrations enable ingesting host findings to generate alerts? (Choose two.)

A.

Splunk

B.

Tenable

C.

JIRA

D.

Qualys

Full Access
Question # 13

Which two statements are true about the differences between build and run config policies? (Choose two.)

A.

Run and Network policies belong to the configuration policy set.

B.

Build and Audit Events policies belong to the configuration policy set.

C.

Run policies monitor resources, and check for potential issues after these cloud resources are deployed.

D.

Build policies enable you to check for security misconfigurations in the IaC templates and ensure that these issues do not get into production.

E.

Run policies monitor network activities in your environment, and check for potential issues during runtime.

Full Access
Question # 14

Which IAM Azure RQL query would correctly generate an output to view users who have sufficient permissions to create security groups within Azure AD and create applications?

A.

config where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions.allowedToCreateSecurityGroups is true and defaultUserRolePermissions.allowedToCreateApps is true

B.

config from cloud.resource where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions exists

C.

config from network where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions.allowedToCreateSecurityGroups is false and defaultUserRolePermissions.allowedToCreateApps is true

D.

config from cloud.resource where api.name = ‘azure-active-directory-authorization-policy’ AND json.rule = defaultUserRolePermissions.allowedToCreateSecurityGroups is true and defaultUserRolePermissions.allowedToCreateApps is true

Full Access
Question # 15

What are the three states of the Container Runtime Model? (Choose three.)

A.

Initiating

B.

Learning

C.

Active

D.

Running

E.

Archived

Full Access
Question # 16

What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?

A.

policy

B.

incident

C.

audit

D.

anomaly

Full Access
Question # 17

A container and image compliance rule has been configured by enabling all checks; however, upon review, the container's compliance view reveals only the entries in the image below.

What is the appropriate action to take next?

A.

Deploy defenders to scan complete container compliance.

B.

Wait until Prisma Cloud finishes the compliance scan and recheck.

C.

Change the rule options to list both failed and passed checks in the compliance rule edit window.

D.

Change the rule options to list only failed checks in the compliance rule edit window.

Full Access
Question # 18

An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query programmatically the existing users, and the user’s associated permission levels, in a Prisma Cloud Enterprise tenant.

Which public documentation location should be reviewed to help determine the required attributes to carry out this step?

A.

Prisma Cloud Administrator’s Guide (Compute)

B.

Prisma Cloud API Reference

C.

Prisma Cloud Compute API Reference

D.

Prisma Cloud Enterprise Administrator’s Guide

Full Access
Question # 19

The attempted bytes count displays?

A.

traffic that is either denied by the security group or firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

B.

traffic that is either denied by the security group or firewall rules.

C.

traffic that is either denied by the firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

D.

traffic denied by the security group or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

Full Access
Question # 20

An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.

What does the administrator need to configure?

A.

A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on WAAS

B.

A ban for DoS protection with a burst rate of 5 and file extensions match on .tar.gz on CNNF

C.

A ban for DoS protection with a burst rate of 5 and file extensions match on .tar gz on WAAS

D.

A ban for DoS protection with an average rate of 5 and file extensions match on .tar.gz on CNNF

Full Access
Question # 21

Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)

A.

Install boto3 & requests library.

B.

Configure IAM Azure remediation script.

C.

Integrate with Azure Service Bus.

D.

Configure IAM AWS remediation script.

Full Access
Question # 22

Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?

A.

Host

B.

Container

C.

Functions

D.

Image

Full Access
Question # 23

When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?

A.

2

B.

4

C.

1

D.

3

Full Access
Question # 24

A Systems Engineer is the administrator of a self-hosted Prisma Cloud console. They upgraded the console to the latest version. However, after the upgrade, the console does not show all the policies configured. Before they upgraded the console, they created a backup manually and exported it to a local drive. Now they have to install a Prisma Cloud to restore from the backup that they manually created. Which Prisma Cloud version can they can restore with the backup?

A.

Any version of Prisma Cloud Self-Hosted Console

B.

Up to N-2 versions of the Prisma Cloud Self-Hosted Console that the backup created

C.

The same version of the Prisma Cloud Self-Hosted Console that the backup created

D.

The latest version of Prisma Cloud Self-Hosted Console

Full Access
Question # 25

What are two alarm types that are registered after alarms are enabled? (Choose two.)

A.

Onboarded Cloud Accounts status

B.

Resource status

C.

Compute resources

D.

External integrations status

Full Access
Question # 26

Which Prisma Cloud policy type can protect against malware?

A.

Event

B.

Network

C.

Config

D.

Data

Full Access
Question # 27

Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?

A.

High

B.

Medium

C.

Low

D.

Very High

Full Access
Question # 28

Order the steps involved in onboarding an AWS Account for use with Data Security feature.

Full Access
Question # 29

Which of the following is a reason for alert dismissal?

A.

SNOOZED_AUTO_CLOSE

B.

ALERT_RULE_ADDED

C.

POLICY_UPDATED

D.

USER_DELETED

Full Access
Question # 30

Which container scan is constructed correctly?

A.

twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 -- container myimage/latest

B.

twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/ latest

C.

twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 --details myimage/latest

D.

twistcli images scan -u api -p api --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest

Full Access
Question # 31

A customer has a requirement to scan serverless functions for vulnerabilities.

What is the correct option to configure scanning?

A.

Configure serverless radar from the Defend > Compliance > Cloud Platforms page.

B.

Embed serverless Defender into the function.

C.

Configure a function scan policy from the Defend > Vulnerabilities > Functions page.

D.

Use Lambda layers to deploy a Defender into the function.

Full Access
Question # 32

Which two filters are available in the SecOps dashboard? (Choose two.)

A.

Time range

B.

Account Groups

C.

Service Name

D.

Cloud Region

Full Access
Question # 33

Which three steps are involved in onboarding an account for Data Security? (Choose three.)

A.

Create a read-only role with in-line policies

B.

Create a Cloudtrail with SNS Topic

C.

Enable Flow Logs

D.

Enter the RoleARN and SNSARN

E.

Create a S3 bucket

Full Access
Question # 34

An administrator has added a Cloud account on Prisma Cloud and then deleted it.

What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?

A.

No alerts will be displayed.

B.

Existing alerts will be displayed again.

C.

New alerts will be generated.

D.

Existing alerts will be marked as resolved.

Full Access
Question # 35

In Prisma Cloud for Azure Net Effective Permissions Calculation, the following Azure permission levels are supported by which three permissions? (Choose three).

A.

Resources

B.

Tenant

C.

Subscription

D.

Resource groups

E.

Management Group

Full Access
Question # 36

A customer's Security Operations Center (SOC) team wants to receive alerts from Prisma Cloud via email once a day about all policies that have a violation, rather than receiving an alert every time a new violation occurs.

Which alert rule configuration meets this requirement?

A.

Configure an alert rule with all the defaults except selecting email within the "Alert Notifications" tab and specifying recipient.

B.

Configure an alert rule. Under the "Policies" tab, select "High Risk Severity Policies." In the "Set Alert Notifications" tab, select "Email > Recurring," set to repeat every 1 day, and enable "Email."

C.

Set up email integrations under the "Integrations" tab in "Settings" and create a notification template.

D.

Configure an alert rule. Under the "Policies" tab, select "All Policies." In the "Set Alert Notifications" tab, select "Email > Recurring," set to repeat every 1 day, and then enable "Email."

Full Access
Question # 37

How many CLI remediation commands can be added in a custom policy sequence?

A.

2

B.

1

C.

4

D.

5

Full Access
Question # 38

A customer has Defenders connected to Prisma Cloud Enterprise. The Defenders are deployed as a DaemonSet in OpenShift.

How should the administrator get a report of vulnerabilities on hosts?

A.

Navigate to Monitor > Vulnerabilities > CVE Viewer

B.

Navigate to Defend > Vulnerabilities > VM Images

C.

Navigate to Defend > Vulnerabilities > Hosts

D.

Navigate to Monitor > Vulnerabilities > Hosts

Full Access
Question # 39

Which two statements explain differences between build and run config policies? (Choose two.)

A.

Run and Network policies belong to the configuration policy set.

B.

Build policies allow checking for security misconfigurations in the IaC templates and ensure these issues do not get into production.

C.

Run policies monitor network activities in the environment and check for potential issues during runtime.

D.

Run policies monitor resources and check for potential issues after these cloud resources are deployed.

Full Access
Question # 40

The security team wants to enable the “block” option under compliance checks on the host.

What effect will this option have if it violates the compliance check?

A.

The host will be taken offline.

B.

Additional hosts will be prevented form starting.

C.

Containers on a host will be stopped.

D.

No containers will be allowed to start on that host.

Full Access
Question # 41

What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?

A.

1

B.

2

C.

3

D.

4

Full Access
Question # 42

What are the two ways to scope a CI policy for image scanning? (Choose two.)

A.

container name

B.

image name

C.

hostname

D.

image labels

Full Access
Question # 43

A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?

A.

twistcli function scan

B.

twistcli scan serverless

C.

twistcli serverless AWS

D.

twiscli serverless scan

Full Access
Question # 44

Which type of query is used for scanning Infrastructure as Code (laC) templates?

A.

API

B.

XML

C.

JSON

D.

RQL

Full Access
Question # 45

The administrator wants to review the Console audit logs from within the Console.

Which page in the Console should the administrator use to review this data, if it can be reviewed at all?

A.

Navigate to Monitor > Events > Host Log Inspection

B.

The audit logs can be viewed only externally to the Console

C.

Navigate to Manage > Defenders > View Logs

D.

Navigate to Manage > View Logs > History

Full Access
Question # 46

An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days.

In which order should the API calls be used to accomplish this task? (Drag the steps into the correct order from the first step to the last.) Select and Place:

Full Access
Question # 47

The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.

Which type of policy should be created to protect this pod from Layer7 attacks?

A.

The development team should create a WAAS rule for the host where these pods will be running.

B.

The development team should create a WAAS rule targeted at all resources on the host.

C.

The development team should create a runtime policy with networking protections.

D.

The development team should create a WAAS rule targeted at the image name of the pods.

Full Access
Question # 48

Which serverless cloud provider is covered by the "overly permissive service access" compliance check?

A.

Alibaba

B.

Azure

C.

Amazon Web Services (AWS)

D.

Google Cloud Platform (GCP)

Full Access
Question # 49

When an alert notification from the alarm center is deleted, how many hours will a similar alarm be suppressed by default?

A.

12

B.

8

C.

24

D.

4

Full Access
Question # 50

Prisma Cloud cannot integrate which of the following secrets managers?

A.

IBM Secret Manager

B.

AzureKey Vault

C.

HashiCorp Vault

D.

AWS Secret Manager

Full Access
Question # 51

During an initial deployment of Prisma Cloud Compute, the customer sees vulnerabilities in their environment.

Which statement correctly describes the default vulnerability policy?

A.

It blocks all containers that contain a vulnerability.

B.

It alerts on any container with more than three critical vulnerabilities.

C.

It blocks containers after 30 days if they contain a critical vulnerability.

D.

It alerts on all vulnerabilities, regardless of severity.

Full Access
Question # 52

Which three platforms support the twistcli tool? (Choose three.)

A.

Linux

B.

Windows

C.

Android

D.

MacOS

E.

Solaris

Full Access
Question # 53

Which command should be used in the Prisma Cloud twistcli tool to scan the nginx:latest image for vulnerabilities and compliance issues?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Full Access
Question # 54

A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)

A.

The value of the mined currency exceeds $100.

B.

High CPU usage over time for the container is detected.

C.

Common cryptominer process name was found.

D.

The mined currency is associated with a user token.

E.

Common cryptominer port usage was found.

Full Access
Question # 55

Which two information types cannot be seen in the data security dashboard? (Choose two).

A.

Bucket owner

B.

Object Data Profile by Region

C.

Top Publicly Exposed Objects By Data Profile

D.

Object content

E.

Total objects

Full Access
Question # 56

In which Console menu would an administrator verify whether a custom compliance check is failing or passing?

A.

Monitor > Compliance

B.

Container Security > Compliance

C.

Defend > Compliance

D.

Custom > Compliance

Full Access
Question # 57

Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts.

Where can the administrator locate this list of e-mail recipients?

A.

Target section within an Alert Rule.

B.

Notification Template section within Alerts.

C.

Users section within Settings.

D.

Set Alert Notification section within an Alert Rule.

Full Access
Question # 58

Which two roles have access to view the Prisma Cloud policies? (Choose two.)

A.

Build AND Deploy Security

B.

Auditor

C.

Dev SecOps

D.

Defender Manager

Full Access
Question # 59

Which statement applies to Adoption Advisor?

A.

It helps adopt security capabilities at a fixed pace regardless of the organization's needs.

B.

It only provides guidance during the deploy phase of the application lifecycle.

C.

It is only available for organizations that have completed the cloud adoption journey.

D.

It includes security capabilities from subscriptions for CSPM, CWP, CCS, OEM, and Data Security.

Full Access
Question # 60

Which container image scan is constructed correctly?

A.

twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/ latest

B.

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest

C.

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest

D.

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest --details

Full Access
Question # 61

Which three actions are available for the container image scanning compliance rule? (Choose three.)

A.

Allow

B.

Snooze

C.

Block

D.

Ignore

E.

Alert

Full Access
Question # 62

What happens when a role is deleted in Prisma Cloud?

A.

The access key associated with that role is automatically deleted.

B.

Any integrations that use the access key to make calls to Prisma Cloud will stop working.

C.

The users associated with that role will be deleted.

D.

Any user who uses that key will be deleted.

Full Access
Question # 63

An organization wants to be notified immediately to any “High Severity” alerts for the account group “Clinical Trials” via Slack.

Which option shows the steps the organization can use to achieve this goal?

A.

1. Configure Slack Integration2.Create an alert rule and select “Clinical Trials” as the account group3.Under the “Select Policies” tab, filter on severity and select “High”4.Under the Set Alert Notification tab, choose Slack and populate the channel5.Set Frequency to “As it Happens”

B.

1. Create an alert rule and select “Clinical Trials” as the account group2.Under the “Select Policies” tab, filter on severity and select “High”3.Under the Set Alert Notification tab, choose Slack and populate the channel4.Set Frequency to “As it Happens”5.Set up the Slack Integration to complete the configuration

C.

1. Configure Slack Integration2.Create an alert rule3.Under the “Select Policies” tab, filter on severity and select “High”4.Under the Set Alert Notification tab, choose Slack and populate the channel5.Set Frequency to “As it Happens”

D.

1. Under the “Select Policies” tab, filter on severity and select “High”2.Under the Set Alert Notification tab, choose Slack and populate the channel3.Set Frequency to “As it Happens”4.Configure Slack Integration5.Create an Alert rule

Full Access
Question # 64

How does assigning an account group to an administrative user on Prisma Cloud help restrict access to resources?

A.

It restricts access only to certain types of resources within the cloud account.

B.

It restricts access to all resources and data within the cloud account.

C.

It restricts access only to the resources and data that pertains to the cloud account(s) within an account group.

D.

It does not restrict access to any resources within the cloud account.

Full Access
Question # 65

A customer has multiple violations in the environment including:

User namespace is enabled

An LDAP server is enabled

SSH root is enabled

Which section of Console should the administrator use to review these findings?

A.

Manage

B.

Vulnerabilities

C.

Radar

D.

Compliance

Full Access
Question # 66

Which port should a security team use to pull data from Console’s API?

A.

53

B.

25

C.

8084

D.

8083

Full Access
Question # 67

Which two attributes are required for a custom config RQL? (Choose two.)

A.

json.rule

B.

cloud.account

C.

api.name

D.

tag

Full Access
Question # 68

Which three actions are required in order to use the automated method within Azure Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose three.)

A.

Install boto3 & requests library.

B.

Configure IAM Azure remediation script.

C.

Integrate with Azure Service Bus.

D.

Configure IAM AWS remediation script.

E.

Install azure.servicebus & requests library.

Full Access
Question # 69

An administrator needs to detect and alert on any activities performed by a root account.

Which policy type should be used?

A.

config-run

B.

config-build

C.

network

D.

audit event

Full Access
Question # 70

What is an example of an outbound notification within Prisma Cloud?

A.

AWS Inspector

B.

Qualys

C.

Tenable

D.

PagerDuty

Full Access
Question # 71

A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company’s AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded individually.

The business unit has decided to cover the scope of this action and determined that a script should be written to onboard each of these accounts with general settings to gain immediate posture visibility across the accounts.

Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?

A.

https://api.prismacloud.io/cloud/

B.

https://api.prismacloud.io/account/aws

C.

https://api.prismacloud.io/cloud/aws

D.

https://api.prismacloud.io/accountgroup/aws

Full Access
Question # 72

If you are required to run in an air-gapped environment, which product should you install?

A.

Prisma Cloud Jenkins Plugin

B.

Prisma Cloud Compute Edition

C.

Prisma Cloud with self-hosted plugin

D.

Prisma Cloud Enterprise Edition

Full Access
Question # 73

A customer does not want alerts to be generated from network traffic that originates from trusted internal networks.

Which setting should you use to meet this customer’s request?

A.

Trusted Login IP Addresses

B.

Anomaly Trusted List

C.

Trusted Alert IP Addresses

D.

Enterprise Alert Disposition

Full Access
Question # 74

Which three types of buckets exposure are available in the Data Security module? (Choose three.)

A.

Public

B.

Private

C.

International

D.

Differential

E.

Conditional

Full Access
Question # 75

Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?

A.

single sign-on

B.

SAML

C.

basic authentication

D.

access key

Full Access
Question # 76

Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)

A.

Run the provided curl | bash script from Console to remove Defenders, and then use Cloud Discovery to automatically redeploy Defenders.

B.

Remove Defenders DaemonSet, and then use Cloud Discovery to automatically redeploy the Defenders.

C.

Remove Defenders, and then deploy the new DaemonSet so Defenders do not have to automatically update on each deployment.

D.

Let Defenders automatically upgrade.

Full Access
Question # 77

A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.

How should the administrator configure Prisma Cloud Compute to satisfy this requirement?

A.

set the Container model to manual relearn and set the default runtime rule to block for process protection.

B.

set the Container model to relearn and set the default runtime rule to prevent for process protection.

C.

add a new runtime policy targeted at a specific Container name, add ransomWare process into the denied process list, and set the action to “prevent”.

D.

choose “copy into rule” for the Container, add a ransomWare process into the denied process list, and set the action to “block”.

Full Access