Palo Alto Networks Prisma Certified Cloud Security Engineer Exam Practice Test

Page: 1 / 14
Total 250 questions
Question 1

Which two offerings will scan container images in Jenkins pipelines? (Choose two.)



Answer : A, D

To integrate security scanning within Jenkins pipelines for container images, the most appropriate tools are the Compute Azure DevOps plugin and Twistcli. The Compute Azure DevOps plugin is designed to integrate with CI/CD workflows, allowing automated security scanning of container images as part of the build process in Azure DevOps environments. This plugin can be used in conjunction with Jenkins pipelines through integration points or scripting to trigger scans during the build or deployment stages. Twistcli, on the other hand, is a command-line interface tool provided by Prisma Cloud (formerly Twistlock) that allows for scanning of container images for vulnerabilities and compliance issues. Twistcli can be directly integrated into Jenkins pipelines using shell scripts or pipeline commands to perform security scans on container images before they are deployed. This ensures that only secure and compliant container images are used in production environments, aligning with DevSecOps practices.


Question 2

Which ban for DoS protection will enforce a rate limit for users who are unable to post five (5) ''. tar.gz" files within five (5) seconds?



Answer : A

In the context of DoS protection, enforcing a rate limit is a common strategy to prevent abuse and ensure service availability. The scenario described involves limiting the rate at which users can post '.tar.gz' files to five within five seconds. The correct ban configuration for this requirement would be one that specifies an average rate of 5 with a file extension match on ''.tar.gz' within the Web Application and API Security (WAAS) component of a security solution like Prisma Cloud. WAAS is designed to protect web applications and APIs from various threats, including DoS attacks, by applying policies that can limit actions based on specific criteria, such as file types and request rates. This configuration ensures that any attempt to upload more than five '.tar.gz' files within a five-second window would be detected and blocked, mitigating the risk of DoS attacks targeting this particular file upload functionality.


Question 3

Which two integrated development environment (IDE) plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)



Answer : A, B

Prisma Cloud by Palo Alto Networks extends its cloud security capabilities to the development environment through the integration with Integrated Development Environments (IDEs) plugins. Among the available options, Visual Studio Code and IntelliJ are supported by Prisma Cloud as part of its Code Security features. These IDE plugins enable developers to incorporate security insights directly into their development workflows, facilitating early detection and remediation of vulnerabilities and compliance issues in the codebase. Visual Studio Code, known for its versatility and extensive plugin ecosystem, and IntelliJ, popular for its powerful coding assistance and ergonomic design, are both widely used by developers. The integration with Prisma Cloud allows for seamless scanning of code for vulnerabilities, misconfigurations, and compliance with security policies, fostering a DevSecOps culture by shifting security left into the early stages of the development lifecycle.


Question 4

Which set of steps is the correct process for obtaining Console images for Prisma Cloud Compute Edition?



Answer : D

Prisma Cloud, part of Palo Alto Networks' cloud security suite, offers Console images that can be retrieved for deployment in various environments. The correct process for obtaining these images involves using basic authentication with Docker, a widely-used containerization platform. Users must first access the official Palo Alto Networks registry at registry.paloaltonetworks.com. Here, they are required to authenticate using the 'docker login' command, which prompts for credentials. Upon successful authentication, users can then use the 'docker pull' command to retrieve the Prisma Cloud Console images. This method ensures secure access to the latest Console images for deployment within an organization's infrastructure, aligning with best practices for container image management and deployment.


Question 5

What factor is not used in calculating the net effective permissions for a resource in AWS?



Answer : C

In the context of calculating net effective permissions for a resource in AWS, IPTables firewall rule is not used. Net effective permissions in AWS are determined by evaluating various AWS-specific mechanisms such as IAM policies, permission boundaries, and service control policies (SCPs). IAM policies define what actions are allowed or denied for various AWS resources. Permission boundaries provide a way to delegate administration for IAM entities, setting the maximum permissions that an IAM entity can have. SCPs are part of AWS Organizations and allow for central control over the maximum available permissions for all accounts within an organization. IPTables, on the other hand, is a Linux-based application for setting up firewall rules on individual hosts and is not directly related to AWS resource permissions. Therefore, IPTables firewall rules are not considered when calculating net effective permissions in AWS, making option C the correct answer.


Question 6

Given the following information, which twistcli command should be run if an administrator were to exec into a running container and scan it from within using an access token for authentication?

* Console is located at https://prisma-console.mydomain.local

* Token is: TOKEN_VALUE

* Report ID is: REPORTJD

* Container image running is: myimage:latest



Answer : B

The twistcli command for scanning images within Prisma Cloud requires specifying the console address, an authentication token, and the target for the scan. Option B correctly formats the command with --console-address to specify the Prisma Cloud console URL, --auth-token for the authentication token, and --local-scan to indicate that the scan is being performed from within a container. The --details flag followed by the image name (myimage:latest) specifies the target image for the scan. The option --containerized is not necessary as the --local-scan already implies scanning within a container environment. Therefore, Option B is the most accurate and valid command based on the given information.


Question 7

In Prisma Cloud for Azure Net Effective Permissions Calculation, the following Azure permission levels are supported by which three permissions? (Choose three).



Answer : A, B, C

In Azure, permissions can be assigned at various levels, including the subscription, resource group, and management group levels. Prisma Cloud's Net Effective Permissions Calculation would typically support these levels to effectively calculate and assess permissions across the Azure environment. Therefore, the correct answers would be A: Resource groups, B: Subscription, and C: Management Group. The option marked as 'Tenant' is not a selectable answer in the provided format and 'Resources' is too generic as it does not specify the permission level.


Page:    1 / 14   
Total 250 questions