Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks CloudSec-Pro Practice Exam with Questions & Answers

Questions 1

The Prisma Cloud administrator has configured a new policy.

Which steps should be used to assign this policy to a compliance standard?

Options:
A.

Edit the policy, go to step 3 (Compliance Standards), click + at the bottom, select the compliance standard, fill in the other boxes, and then click Confirm.

B.

Create the Compliance Standard from Compliance tab, and then select Add to Policy.

C.

Open the Compliance Standards section of the policy, and then save.

D.

Custom policies cannot be added to existing standards.

Paloalto Networks CloudSec-Pro Premium Access
Questions 2

Which command should be used in the Prisma Cloud twistcli tool to scan the nginx:latest image for vulnerabilities and compliance issues?

A)

B)

CloudSec-Pro Question 2

C)

CloudSec-Pro Question 2

D)

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 3

Which two filters are available in the SecOps dashboard? (Choose two.)

Options:
A.

Time range

B.

Account Groups

C.

Service Name

D.

Cloud Region

Questions 4

Which RQL will trigger the following audit event activity?

Options:
A.

event from cloud.audit_logs where operation ConsoleLogin AND user = 'root’

B.

event from cloud.audit_logs where operation IN('cloudsql.instances.update','cloudsql.sslCerts.create', cloudsql.instances.create','cloudsq

C.

event from cloud.audit_logs where cloud.service = s3.amazonaws.com' AND json.rule = $.userAgent contains 'parrot1

D.

event from cloud.audit_logs where operation IN ( 'GetBucketWebsite', 'PutBucketWebsite', 'DeleteBucketWebsite')

Questions 5

Under which tactic is “Exploit Public-Facing Application” categorized in the ATT&CK framework?

Options:
A.

Defense Evasion

B.

Initial Access

C.

Execution

D.

Privilege Escalation

Questions 6

An administrator sees that a runtime audit has been generated for a container.

The audit message is:

“/bin/ls launched and is explicitly blocked in the runtime rule. Full command: ls -latr”

Which protection in the runtime rule would cause this audit?

Options:
A.

Networking

B.

File systems

C.

Processes

D.

Container

Questions 7

Which ban for DoS protection will enforce a rate limit for users who are unable to post five (5) “. tar.gz" files within five (5) seconds?

Options:
A.

One with an average rate of 5 and file extensions match on “. tar.gz" on Web Application and API Security (WAAS)

B.

One with an average rate of 5 and file extensions match on “. tar.gz" on Cloud Native Network Firewall (CNNF)

C.

One with a burst rate of 5 and file extensions match on “. tar.gz" on Web Application and API Security (WAAS) *

D.

One with a burst rate of 5 and file extensions match on “. tar.gz" on Cloud Native Network Firewall (CNNF)

Questions 8

Which type of RQL query should be run to determine if AWS Elastic Compute Cloud (EC2) instances without encryption was enabled?

Options:
A.

NETWORK

B.

EVENT

C.

CONFIG

D.

SECURITY

Questions 9

A customer has serverless functions that are deployed in multiple clouds.

Which serverless cloud provider is covered be “overly permissive service access” compliance check?

Options:
A.

Alibaba

B.

GCP

C.

AWS

D.

Azure

Questions 10

Which statement about build and run policies is true?

Options:
A.

Build policies enable you to check for security misconfigurations in the IaC templates.

B.

Every type of policy has auto-remediation enabled by default.

C.

The four main types of policies are: Audit Events, Build, Network, and Run.

D.

Run policies monitor network activities in the environment and check for potential issues during runtime.