Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks CloudSec-Pro Practice Exam with Questions & Answers | Set: 6

Questions 51

Which statement is true regarding CloudFormation templates?

Options:
A.

Scan support does not currently exist for nested references, macros, or intrinsic functions.

B.

A single template or a zip archive of template files cannot be scanned with a single API request.

C.

Request-Header-Field ‘cloudformation-version’ is required to request a scan.

D.

Scan support is provided for JSON, HTML and YAML formats.

Paloalto Networks CloudSec-Pro Premium Access
Questions 52

The security team wants to target a CNAF policy for specific running Containers. How should the administrator scope the policy to target the Containers?

Options:
A.

scope the policy to Image names.

B.

scope the policy to namespaces.

C.

scope the policy to Defender names.

D.

scope the policy to Host names.

Questions 53

Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)

Options:
A.

DoS Protection

B.

Local file inclusion

C.

SQL injection

D.

Suspicious binary

E.

Shellshock

Questions 54

If you are required to run in an air-gapped environment, which product should you install?

Options:
A.

Prisma Cloud Jenkins Plugin

B.

Prisma Cloud Compute Edition

C.

Prisma Cloud with self-hosted plugin

D.

Prisma Cloud Enterprise Edition

Questions 55

Given the following RQL:

Which audit event snippet is identified by the RQL?

A)

B)

C)

D)

CloudSec-Pro Question 55

Options:
A.

Option A

B.

Option B

C.

Option C

D.

Option D

Questions 56

Which serverless cloud provider is covered by the "overly permissive service access" compliance check?

Options:
A.

Alibaba

B.

Azure

C.

Amazon Web Services (AWS)

D.

Google Cloud Platform (GCP)

Questions 57

Which set of steps is the correct process for obtaining Console images for Prisma Cloud Compute Edition?

Options:
A.

To retrieve Prisma Cloud Console images using basic authentication: 1. Access registry.twistlock.com and authenticate using "docker login."2. Retrieve the Prisma Cloud Console images using "docker pull."

B.

To retrieve Prisma Cloud Console images using URL authentication:1. Access registry-url-auth.twistlock.com and authenticate using the user certificate.2. Retrieve the Prisma Cloud Console images using "docker pull."

C.

To retrieve Prisma Cloud Console images using URL authentication: 1. Access registry-auth.twistlock.com and authenticate using the user certificate.2. Retrieve the Prisma Cloud Console images using "docker pull."

D.

To retrieve Prisma Cloud Console images using basic authentication:1. Access registry.paloaltonetworks.com and authenticate using "docker login."2. Retrieve the Prisma Cloud Console images using "docker pull."

Questions 58

You have onboarded a public cloud account into Prisma Cloud Enterprise. Configuration Resource ingestion is visible in the Asset Inventory for the onboarded account, but no alerts are being generated for the configuration assets in the account.

Config policies are enabled in the Prisma Cloud Enterprise tenant, with those policies associated to existing alert rules. ROL statements on the investigate matching those policies return config resource results successfully.

Why are no alerts being generated?

Options:
A.

The public cloud account is not associated with an alert notification.

B.

The public cloud account does not have audit trail ingestion enabled.

C.

The public cloud account does not access to configuration resources.

D.

The public cloud account is not associated with an alert rule.

Questions 59

An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type A”.

Why would this message appear as an audit?

Options:
A.

The DNS was not learned as part of the Container model or added to the DNS allow list.

B.

This is a DNS known to be a source of malware.

C.

The process calling out to this domain was not part of the Container model.

D.

The Layer7 firewall detected this as anomalous behavior.

Questions 60

A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?

Options:
A.

They can deploy any type of container defender to scan this registry.

B.

There are Windows host defenders deployed in your environment already.

C.

There are Windows host defenders deployed in your environment already. Therefore, they do not need to deploy any additional defenders.

D.

A defender is not required to configure this type of registry scan.