We at Crack4sure are committed to giving students who are preparing for the Paloalto Networks CloudSec-Pro Exam the most current and reliable questions . To help people study, we've made some of our Palo Alto Networks Cloud Security Professional exam materials available for free to everyone. You can take the Free CloudSec-Pro Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.
Which step is included when configuring Kubernetes to use Prisma Cloud Compute as an admission controller?
What are two ways to scan container images in Jenkins pipelines? (Choose two.)
Which two statements apply to the Defender type Container Defender - Linux?
Under which tactic is “Exploit Public-Facing Application” categorized in the ATT&CK framework?
Which three types of classifications are available in the Data Security module? (Choose three.)
An administrator has added a Cloud account on Prisma Cloud and then deleted it.
What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?
Which action would be applicable after enabling anomalous compute provisioning?
Creation of a new custom compliance standard that is based on other individual custom compliance standards needs to be automated.
Assuming the necessary data from other standards has been collected, which API order should be used for this new compliance standard?
Which data storage type is supported by Prisma Cloud Data Security?
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?
How is the scope of each rule determined in the Prisma Cloud Compute host runtime policy?
What is the most reliable and extensive source for documentation on Prisma Cloud APIs?
An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.
What does the administrator need to configure?
What are two built-in RBAC permission groups for Prisma Cloud? (Choose two.)
Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)
Which two elements are included in the audit trail section of the asset detail view? (Choose two).
Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.
Where should the customer navigate in Console?
Which statement accurately characterizes SSO Integration on Prisma Cloud?
Which RQL query type is invalid?
Which two offerings will scan container images in Jenkins pipelines? (Choose two.)
On which cloud service providers can you receive new API release information for Prisma Cloud?
The Prisma Cloud administrator has configured a new policy.
Which steps should be used to assign this policy to a compliance standard?
Review this admission control policy:
match[{"msg": msg}] { input.request.operation == "CREATE" input.request.kind.kind == "Pod" input.request.resource.resource == "pods"
input.request.object.spec.containers[_].securityContext.privileged msg := "Privileged"
}
Which response to this policy will be achieved when the effect is set to “block”?
A customer finds that an open alert from the previous day has been resolved. No auto-remediation was configured.
Which two reasons explain this change in alert status? (Choose two.)
A customer has Defenders connected to Prisma Cloud Enterprise. The Defenders are deployed as a DaemonSet in OpenShift.
How should the administrator get a report of vulnerabilities on hosts?
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
Which two attributes are required for a custom config RQL? (Choose two.)
Which two integrated development environment (IDE) plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?
Which port should a security team use to pull data from Console’s API?
Which of the following is not a supported external integration for receiving Prisma Cloud Code Security notifications?
A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)
How many CLI remediation commands can be added in a custom policy sequence?
A Systems Engineer is the administrator of a self-hosted Prisma Cloud console. They upgraded the console to the latest version. However, after the upgrade, the console does not show all the policies configured. Before they upgraded the console, they created a backup manually and exported it to a local drive. Now they have to install a Prisma Cloud to restore from the backup that they manually created. Which Prisma Cloud version can they can restore with the backup?
A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
One of the resources on the network has triggered an alert for a Default Config policy.
Given the following resource JSON snippet:
Which RQL detected the vulnerability?
A)
B)
C)
D)
Which three AWS policy types and identities are used to calculate the net effective permissions? (Choose three).
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?
A customer wants to be notified about port scanning network activities in their environment. Which policy type detects this behavior?
What is the frequency to create a compliance report? (Choose two.)
Which Prisma Cloud policy type can protect against malware?
What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?
What is the primary purpose of Prisma Cloud Code Security?
Which order of steps map a policy to a custom compliance standard?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant’s existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.
Which option shows the steps required during the alert rule creation process to achieve this objective?
Which RQL will trigger the following audit event activity?
Given the following audit event activity snippet:
Which RQL will be triggered by the audit event?
A)
B)
C)
D)
An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days.
In which order should the API calls be used to accomplish this task? (Drag the steps into the correct order from the first step to the last.) Select and Place:
An administrator of Prisma Cloud wants to enable role-based access control for Docker engine.
Which configuration step is needed first to accomplish this task?
Which policy type should be used to detect and alert on cryptominer network activity?
Which container image scan is constructed correctly?
Which IAM Azure RQL query would correctly generate an output to view users who have sufficient permissions to create security groups within Azure AD and create applications?
Which two statements are true about the differences between build and run config policies? (Choose two.)
A customer has a development environment with 50 connected Defenders. A maintenance window is set for Monday to upgrade 30 stand-alone Defenders in the development environment, but there is no maintenance window available until Sunday to upgrade the remaining 20 stand-alone Defenders.
Which recommended action manages this situation?
While writing a custom RQL with array objects in the investigate page, which type of auto-suggestion a user can leverage?
A security team has been asked to create a custom policy.
Which two methods can the team use to accomplish this goal? (Choose two.)
A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?
Which policy type in Prisma Cloud can protect against malware?
An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query programmatically the existing users, and the user’s associated permission levels, in a Prisma Cloud Enterprise tenant.
Which public documentation location should be reviewed to help determine the required attributes to carry out this step?
Which two CI/CD plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
What are two alarm types that are registered after alarms are enabled? (Choose two.)
A customer wants to monitor the company’s AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now.
Which two pieces of information do you need to onboard this account? (Choose two.)
Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.
Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?
A security team has a requirement to ensure the environment is scanned for vulnerabilities. What are three options for configuring vulnerability policies? (Choose three.)
The InfoSec team wants to be notified via email each time a Security Group is misconfigured. Which Prisma Cloud tab should you choose to complete this request?
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
What is a benefit of the Cloud Discovery feature?
A Prisma Cloud administrator is onboarding a single GCP project to Prisma Cloud. Which two steps can be performed by the Terraform script? (Choose two.)
Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).
A customer has a requirement to scan serverless functions for vulnerabilities.
Which three settings are required to configure serverless scanning? (Choose three.)
Which role must be assigned to DevOps users who need access to deploy Container and Host Defenders in Compute?
3 Months Free Update
3 Months Free Update
3 Months Free Update