Spring Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70track

Free Paloalto Networks CloudSec-Pro Practice Exam with Questions & Answers | Set: 7

Questions 61

An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days.

In which order should the API calls be used to accomplish this task? (Drag the steps into the correct order from the first step to the last.) Select and Place:

CloudSec-Pro Question 61

Options:
Paloalto Networks CloudSec-Pro Premium Access
Questions 62

Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)

Options:
A.

Network flow

B.

Audit

C.

Traffic

D.

Users

Questions 63

The attempted bytes count displays?

Options:
A.

traffic that is either denied by the security group or firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

B.

traffic that is either denied by the security group or firewall rules.

C.

traffic that is either denied by the firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

D.

traffic denied by the security group or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

Questions 64

What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?

Options:
A.

Go to Settings > Data > Snippet Masking and select Full Mask.

B.

Go to Settings > Data > Data Patterns, search for SSN Pattern, edit it, and modify the proximity keywords.

C.

Go to Settings > Cloud Accounts > Edit Cloud Account > Assign Account Group and select a group with limited permissions.

D.

Go to Policies > Data > Clone > Modify Objects containing Financial Information publicly exposed and change the file exposure to Private.

Questions 65

Which data storage type is supported by Prisma Cloud Data Security?

Options:
A.

IBM Cloud Object Storage

B.

AWS S3 buckets

C.

Oracle Object Storage

D.

Google storage class

Questions 66

A customer has a development environment with 50 connected Defenders. A maintenance window is set for Monday to upgrade 30 stand-alone Defenders in the development environment, but there is no maintenance window available until Sunday to upgrade the remaining 20 stand-alone Defenders.

Which recommended action manages this situation?

Options:
A.

Go to Manage > Defender > Manage, then click Defenders, and use the Scheduler to choose which Defenders will be automatically upgraded during the maintenance window.

B.

Find a maintenance window that is suitable to upgrade all stand-alone Defenders in the development environment.

C.

Upgrade a subset of the Defenders by clicking the individual Actions > Upgrade button in the row that corresponds to the Defender that should be upgraded during the maintenance window.

D.

Open a support case with Palo Alto Networks to arrange an automatic upgrade.

Questions 67

The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?

Options:
A.

Ensure functions are not overly permissive.

B.

Ensure host devices are not directly exposed to containers.

C.

Ensure images are created with a non-root user.

D.

Ensure compliant Docker daemon configuration.

Questions 68

Which file extension type is supported for Malware scanning in Prisma Cloud Data Security (PCDS)?

Options:
A.

.bat

B.

.apk

C.

.vb

D.

.py

Questions 69

A customer has configured the JIT, and the user created by the process is trying to log in to the Prisma Cloud console. The user encounters the following error message:

What is the reason for the error message?

Options:
A.

The attribute name is not set correctly in JIT settings.

B.

The user does not exist.

C.

The user entered an incorrect password

D.

The role is not assigned for the user.

Questions 70

Creation of a new custom compliance standard that is based on other individual custom compliance standards needs to be automated.

Assuming the necessary data from other standards has been collected, which API order should be used for this new compliance standard?

Options:
A.

1) https://api.prismacloud.io/compliance/add2) https://api.prismacloud.io/compliance/requirementld/section3) https://api.prismacloud.io/compliance/complianceld/requirement

B.

1) https://api.prismacloud.io/compliance2) https://api.prismacloud.io/compliance/complianceld/requirement3) https://api.prismacloud.io/compliance/requirementld/section

C.

1) https://api.prismacloud.io/compliance/add2) https://api.prismacloud.io/compliance/complianceld/requirement3) https://api.prismacloud.io/compliance/requirementld/section

D.

1) https://api.prismacloud.io/compliance2) https://api.prismacloud.io/compliance/requirementld/section3) https://api.prismacloud.io/compliance/complianceld/requirement