Palo Alto Networks PCCSE Exam
Prisma Certified Cloud Security Engineer (Page 2 )

Updated On: 1-Feb-2026

Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.

Where should the customer navigate in Console?

  1. Monitor > Compliance
  2. Defend > Compliance
  3. Manage > Compliance
  4. Custom > Compliance

Answer(s): B


Reference:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin- compute/compliance/ manage_compliance.html

In the context of Prisma Cloud by Palo Alto Networks, the correct navigation to identify alerted compliance checks set by default is under the "Defend" section, specifically at "Defend > Compliance." This section is designed to allow users to configure and manage compliance policies and rules, monitor compliance statuses, and review alerts related to compliance violations. The "Defend" section is tailored for setting up defenses, including compliance standards, against potential security risks within the cloud environment, making it the logical location for managing and reviewing compliance-related alerts and settings.



Which resource and policy type are used to calculate AWS Net Effective Permissions? (Choose two.)

  1. Service Linked Roles
  2. Lambda Function
  3. Amazon Resource Names (ARNs) using Wild Cards
  4. AWS Service Control Policies (SCPs)

Answer(s): A,D

Explanation:

To calculate AWS Net Effective Permissions, which reflect the actual permissions that an IAM entity (user or role) has within an AWS environment, the following resource and policy types are crucial:
Service Linked Roles: These are predefined by AWS for certain services, allowing the services to access other AWS services on the user's behalf. Understanding the permissions associated with these roles is essential for calculating net effective permissions because they can grant significant access within the AWS environment.
AWS Service Control Policies (SCPs): S, C, Ps are used in AWS Organizations to manage permissions for all accounts within the organization. They allow or deny access to certain AWS services and actions across all accounts. SCPs play a critical role in calculating net effective permissions as they can override IAM policies and permissions, effectively narrowing down the permissions an IAM entity has.
By analyzing these resources and policy types, organizations can gain a clear understanding of the effective permissions assigned to their IAM entities, ensuring that they adhere to the principle of least privilege and reducing the risk of unauthorized access or actions within their AWS environment.



When an alert notification from the alarm center is deleted, how many hours will a similar alarm be suppressed by default?

  1. 12
  2. 8
  3. 24
  4. 4

Answer(s): A

Explanation:

In Prisma Cloud's alarm center, when an alert notification is deleted, the system is designed to suppress similar alarms for a default duration to prevent alert fatigue and allow administrators to address the underlying issue without being overwhelmed by repetitive notifications. The default suppression duration is set to 12 hours. This means that once an alert is deleted, any similar alarms triggered by the same conditions or configurations will not be generated for the next 12 hours. This feature helps in managing the alert volume, allowing security teams to prioritize and focus on remediation efforts effectively without the distraction of recurring alerts for the same issue.



Which component of a Kubernetes setup can approve, modify, or reject administrative requests?

  1. Kube Controller
  2. Terraform Controller
  3. Admission Controller
  4. Control plane

Answer(s): C

Explanation:

In a Kubernetes environment, the Admission Controller is a critical component responsible for approving, modifying, or rejecting administrative requests before they are processed by the Kubernetes API server. The Admission Controller acts as a gatekeeper, enforcing governance and policy controls by evaluating requests against a set of predefined rules and policies. It can validate and mutate requests, ensuring that only compliant and authorized changes are allowed to proceed. This capability is vital for maintaining the security and integrity of the Kubernetes cluster, as it can prevent unauthorized or potentially harmful actions from being executed, thus playing a key role in the cluster's overall security posture.



Which three actions are available for the container image scanning compliance rule? (Choose three.)

  1. Allow
  2. Snooze
  3. Block
  4. Ignore
  5. Alert

Answer(s): A,B,E

Explanation:

For container image scanning compliance rules in Prisma Cloud, the available actions that can be taken when a compliance violation is detected are:
Allow: This action permits the container image to be used despite the compliance violation. It's typically used when the risk associated with the violation is accepted or deemed minimal. Snooze: This action temporarily ignores the compliance violation for a specified period. It's useful when immediate remediation is not possible, but the issue is planned to be addressed in the near future.
Alert: This action generates an alert to notify the relevant personnel or systems about the compliance violation without blocking the use of the container image. It enables teams to be aware of and track compliance issues while deciding on the appropriate remediation steps.

These actions provide flexibility in managing compliance violations based on the organization's policies, risk tolerance, and remediation capabilities.



Viewing page 2 of 51
Viewing questions 6 - 10 out of 260 questions



Post your Comments and Discuss Palo Alto Networks PCCSE exam prep with other Community members:

Join the PCCSE Discussion