Free PCCSE Exam Braindumps (page: 24)

Page 23 of 63

If you are required to run in an air-gapped environment, which product should you install?

  1. Prisma Cloud Jenkins Plugin
  2. Prisma Cloud Compute Edition
  3. Prisma Cloud with self-hosted plugin
  4. Prisma Cloud Enterprise Edition

Answer(s): B


Reference:

https://docs.paloaltonetworks.com/prisma/prisma-cloud.html Prisma Cloud Compute Edition is the suitable product for air-gapped environments, where there is no direct internet access. This edition can be installed and operated in isolated environments, providing cloud security capabilities without the need for external connectivity.



What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?

  1. 1
  2. 2
  3. 3
  4. 4

Answer(s): B


Reference:

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage- prisma-cloud-administrators/create-access-
keys.html#:~:text=You%20can%20enable%20API%20access,generate%20one%20access%20key%20o nly

In Prisma Cloud, a user with a System Admin role can generate a maximum of 2 access keys. These keys are used for API access and automation, enabling secure and controlled interactions with Prisma Cloud's capabilities.



DRAG DROP (Drag and Drop is not supported)
Put the steps involved to configure and scan using the IntelliJ plugin in the correct order.

  1. See Explanation section for answer.

Answer(s): A

Explanation:


Install IntelliJ IDE
Add Prisma Cloud plugin
Configure the Prisma Cloud plugin

Scan using the Prisma Cloud plugin

To configure and use the Prisma Cloud plugin for scanning within the IntelliJ Integrated Development Environment (IDE), you must follow a series of steps in a specific order to ensure proper setup and functionality.
Firstly, you need to have the IntelliJ IDE installed on your system. Without the IDE, you cannot add or use the Prisma Cloud plugin, as it is designed to work within this development environment. Secondly, after installing the IntelliJ IDE, you add the Prisma Cloud plugin. This involves navigating to the plugin marketplace within IntelliJ and selecting the Prisma Cloud plugin for installation. Once the plugin is added to your IntelliJ IDE, the next step is to configure the Prisma Cloud plugin. This configuration may include setting up your Prisma Cloud credentials, specifying your scan options, and other settings that tailor the plugin's functionality to your needs.

Finally, after the plugin is installed and configured, you can proceed to scan your project using the Prisma Cloud plugin. This will check your code against security policies and compliance standards, providing feedback and recommendations for any identified issues. Following these steps ensures that the Prisma Cloud plugin is properly integrated into your IntelliJ development workflow, allowing for continuous security and compliance checks as part of the development process.



An administrator needs to detect and alert on any activities performed by a root account.
Which policy type should be used?

  1. config-run
  2. config-build
  3. network
  4. audit event

Answer(s): D

Explanation:

To detect and alert on activities performed by a root account, an audit event policy should be used. An audit event policy is a type of policy that can be used to detect suspicious activities or events that may be related to security threats. This type of policy will allow the administrator to monitor and alert on any activities performed by a root account.

https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud- policies/prisma-cloud-threat-detection
The correct policy type to use in order to detect and alert on any activities performed by a root account is an "audit event" policy. An audit event policy is designed to monitor and record a series of chronological events in the order they occur, typically used to track user activities and changes within the system.
When a root account performs any actions, an audit event policy will log these events, allowing the administrator to review and potentially set up alerts if suspicious or unauthorized activities are detected. This type of policy is crucial for security and compliance purposes as it helps ensure that all actions performed with root privileges are legitimate and authorized. Reference to this can be found in most cloud security platforms that offer CSPM (Cloud Security Posture Management) solutions. For example, within Prisma Cloud by Palo Alto Networks, audit events are a part of the Activity Monitoring features, which track user activities and system changes to facilitate investigations into suspicious or unauthorized actions.






Post your Comments and Discuss Palo Alto Networks PCCSE exam with other Community members:

PCCSE Discussions & Posts