Palo Alto Networks PCCSE Exam
Prisma Certified Cloud Security Engineer (Page 18 )

Updated On: 1-Feb-2026

Which two roles have access to view the Prisma Cloud policies? (Choose two.)

  1. Build AND Deploy Security
  2. Auditor
  3. Dev SecOps
  4. Defender Manager

Answer(s): B,C

Explanation:

In Prisma Cloud, roles with access to view policies include Auditor and Dev SecOps. The Auditor role is typically focused on compliance and oversight, allowing users to review configurations, policies, and compliance status without making changes. The Dev SecOps role bridges the gap between development, security, and operations, focusing on integrating security practices within the CI/CD

pipeline. Both roles require access to Prisma Cloud policies to perform their functions effectively, ensuring that security and compliance are maintained throughout the cloud environment and application lifecycle.



An administrator has added a Cloud account on Prisma Cloud and then deleted it.
What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?

  1. No alerts will be displayed.
  2. Existing alerts will be displayed again.
  3. New alerts will be generated.
  4. Existing alerts will be marked as resolved.

Answer(s): B

Explanation:

When an administrator adds a Cloud account to Prisma Cloud and then deletes it, if the deleted account is added back to Prisma Cloud within a 24-hour period, the existing alerts associated with that account will be displayed again. This behavior ensures continuity in monitoring and alerting, allowing security teams to retain visibility into potential security issues or compliance violations associated with the cloud account. Re-displaying existing alerts helps maintain a consistent security posture and ensures that no critical alerts are overlooked during the re-addition process.



In which two ways can Prisma Cloud images be retrieved in Prisma Cloud Compute Self-Hosted Edition? (Choose two.)

  1. Pull the images from the Prisma Cloud registry without any authentication.
  2. Authenticate with Prisma Cloud registry, and then pull the images from the Prisma Cloud registry.
  3. Retrieve Prisma Cloud images using URL auth by embedding an access token.
  4. Download Prisma Cloud images from github.paloaltonetworks.com.

Answer(s): B,C

Explanation:

In Prisma Cloud Compute Self-Hosted Edition, images can be retrieved by first authenticating with the Prisma Cloud registry and then pulling the images from the Prisma Cloud registry. This process ensures secure access to Prisma Cloud images, as authentication is required to access the registry. By using authentication, Prisma Cloud ensures that only authorized users can retrieve and deploy Prisma Cloud images, maintaining the security and integrity of the deployment.



Which action would be applicable after enabling anomalous compute provisioning?

  1. It detects the activity caused by the spambot.
  2. It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment.
  3. It detects potential creation of an unauthorized network of compute instances with AutoFocus.
  4. It detects potential creation of an unauthorized network of compute instances either accidentally or for cryptojacking.

Answer(s): D

Explanation:

Enabling anomalous compute provisioning in Prisma Cloud allows for the detection of unusual and potentially unauthorized activities related to the creation of compute instances. This feature is particularly useful for identifying scenarios where an unauthorized network of compute instances might be established, either accidentally due to misconfigurations or maliciously for purposes such as cryptojacking. Cryptojacking involves the unauthorized use of someone else's compute resources to mine cryptocurrency, and anomalous compute provisioning can help in identifying such activities by highlighting unusual patterns in the provisioning of compute resources.



What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?

  1. It is a unique identifier needed only when Monitor & Protect mode is selected.
  2. It is the resource name for the Prisma Cloud Role.
  3. It is a UUID that establishes a trust relationship between the Prisma Cloud account and the AWS account in order to extract data.
  4. It is the default name of the PrismaCloudApp stack.

Answer(s): C

Explanation:

The external ID plays a crucial role when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud. It serves as a UUID (Universally Unique Identifier) that establishes a trust relationship between the Prisma Cloud account and the AWS account. This trust relationship is essential for allowing Prisma Cloud to securely extract data and perform security monitoring and compliance checks within the AWS environment. The use of an external ID ensures that Prisma Cloud can access the necessary information from the AWS account without compromising the security of the AWS account's credentials, adhering to the principle of least privilege and enhancing the overall security posture.



Viewing page 18 of 51
Viewing questions 86 - 90 out of 260 questions



Post your Comments and Discuss Palo Alto Networks PCCSE exam prep with other Community members:

Join the PCCSE Discussion