PCCSE Practice Questions
258 real PCCSE exam questions with expert-verified answers and explanations. Page 2 of 6.
- Question #51Prisma Cloud Platform
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?
Prisma Cloud ConsoleInstallationAmazon ECSDeployment - Question #52Prisma Cloud Platform
Which options show the steps required after upgrade of Console?
Prisma Cloud Console upgradeDefender managementPost-upgrade steps - Question #53Cloud Compliance and Governance
The compliance team needs to associate Prisma Cloud policies with compliance frameworks. Which option should the team select to perform this task?
Prisma Cloud PoliciesCompliance FrameworksPolicy Management - Question #54Prisma Cloud Platform
The administrator wants to review the Console audit logs from within the Console. Which page in the Console should the administrator use to review this data, if it can be reviewed...
Prisma Cloud ConsoleAudit logsNavigationPlatform administration - Question #55Container Security
The security team wants to target a CMAF policy for specific running Containers. How should the administrator scope the policy to target the Containers?
Container Security PolicyPrisma Cloud ComputePolicy ScopingContainer Images - Question #56Cloud Compliance and Governance
A customer wants to turn on Auto Remediation. Which policy type has the built-in CLI command for remediation?
Auto RemediationPrisma Cloud PoliciesCSPMConfiguration Policies - Question #57Prisma Cloud Platform
Which authentication mechanism is supported by Prisma Cloud?
Authentication mechanismsCertificate-based authenticationPrisma Cloud UIPrisma Cloud API - Question #58Prisma Cloud Platform
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?
Prisma Cloud AuthenticationProgrammatic AccessAPI SecurityAccess Keys - Question #59Container Security
Where do you install an app-embedded Defender?
Container SecurityDefender DeploymentDocker ImagesApplication Security - Question #60Cloud Native Security
How do you deploy a host Defender on Windows?
Host DefenderAgent DeploymentWindows SecurityPowerShell - Question #61Prisma Cloud Platform
In Prisma Cloud Compute, what is the default HTTPS port for the Console?
Prisma Cloud ComputeConsoleDefault PortsHTTPS - Question #62Container Security
A customer is interested in PCI requirements and needs to ensure that no privilege containers can start in the environment. Which action needs to be set for "do not use privileged...
Privileged ContainersContainer Security PolicyPCI ComplianceEnforcement Actions - Question #63Container Security
Which "kind" of Kubernetes object that is configured to ensure that Defender is acting as the admission controller?
Kubernetes Admission ControllerValidating WebhookPrisma Cloud DefenderContainer Security - Question #64Prisma Cloud Platform
Which option identifies the Prisma Cloud Compute Edition?
Prisma Cloud ComputeDeployment ModelSelf-hosted software - Question #65Container Security
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed How should the administrator configure Prisma Cloud...
Container Runtime SecurityPrisma Cloud Compute PoliciesProcess EnforcementRuntime Defense - Question #66Prisma Cloud Platform
Which statement is true about obtaining Console images for Prisma Cloud Compute Edition'?
Prisma Cloud ComputeConsole DeploymentImage RetrievalAuthentication - Question #67Prisma Cloud Platform
Which option shows the steps to install the Console in a Kubernetes Cluster?
Prisma Cloud ConsoleKubernetes DeploymentInstallation StepsCloud Native Deployment - Question #68Data Security
Which three types of bucket exposure are available in the Data Security module? (Choose three.)
Bucket exposurePrisma Cloud Data SecurityCloud storage securityData exposure types - Question #69Container Security
Given this information: - The Console is located at https://prisma-console.mydomain.local - The username is: cluster - The password is: password123 - The image to scan is: myimage:...
twistcliContainer vulnerability scanningCLI commandsPrisma Cloud Compute - Question #70Prisma Cloud Platform
What is the maximum idle timeout without using a custom value?
Idle TimeoutSession ManagementPlatform ConfigurationSecurity Best Practices - Question #71Container Security
Which command do you use to install a container Defender on Linux?
Prisma Cloud DefenderContainer Defender installationLinux commandscurl - Question #72Prisma Cloud Platform
Which statement accurately characterizes SSO Integration on Prisma Cloud?
SSO IntegrationSAMLIdentity ProvidersPrisma Cloud Administration - Question #73Cloud Native Security
A customer has Defenders connected to Prisma Cloud Enterprise. The Defenders are deployed as a DaemonSet in OpenShift. How should the administrator get a report of vulnerabilities...
Prisma Cloud EnterpriseVulnerability ManagementHost VulnerabilitiesUI Navigation - Question #74Prisma Cloud Platform
A Prisma Cloud administrator is tasked with pulling a report via API. The Prisma Cloud tenant is located on app2.pnsmacfoudjo. What is the correct API endpoint?
Prisma Cloud APIAPI EndpointsPlatform AccessRegionalization - Question #75Container Security
Which container image scan is constructed correctly?
twistcliContainer Image ScanningPrisma CloudCLI Syntax - Question #76Container Security
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
Host SecurityContainer SecurityDocker DaemonCompliance - Question #77Container Security
Which two processes ensure that builds can function after a Console upgrade? (Choose two )
Prisma Cloud ConsoletwistcliCI/CD integrationBuild compatibility - Question #78Prisma Cloud Platform
The InfoSec team wants to be notified via email each time a Security Group is misconfigured, Which Prisma Cloud tab should you choose to complete this request?
Prisma Cloud AlertsSecurity MisconfigurationEmail NotificationsCloud Network Security - Question #79Prisma Cloud Platform
Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?
Anomaly detectionAlert intensityEvent thresholdsPrisma Cloud alerts - Question #80Container Security
Review this admission control policy: match[{"msg": msg}] { input.request.operation == "CREATE" input.request.kind.kind == "Pod" input.request.resource.resource == "pods" input.req...
Admission ControlKubernetes PodsPrivileged ContainersPolicy Enforcement - Question #81Application Security
The security team wants to protect a web application container from an SQLi attack. Which type of policy should the administrator create to protect the container?
SQLi ProtectionContainer SecurityCNAFWeb Application Protection - Question #82Serverless Security
A customer is deploying Defenders to a Fargate environment It wants to understand the vulnerabilities in the images it is deploying. How should the customer automate vulnerability...
Fargate SecurityContainer Vulnerability ScanningPrisma Cloud DefendersRuntime Security - Question #83Container Security
A security team notices a number of anomalies under Monitor > Events. The incident response team works with the developers to determine that these anomalies are false positives. Wh...
Anomaly DetectionContainer Runtime SecurityPrisma Cloud DefenderBehavioral Modeling - Question #84Cloud Native Security
An administrator sees that a runtime audit has been generated for a host. The audit message is: 'Service postfix attempted to obtain capability SHELL by executing /bin/sh /usr/libe...
Runtime SecurityHost ProtectionSecurity PoliciesSuspicious Behavior Detection - Question #85Cloud Compliance and Governance
If a Docker image raises a high severity compliance concern, what is the first digit of the compliance ID?
Prisma Cloud ComplianceCompliance IDSeverity MappingContainer Compliance - Question #86Container Security
The TCP listener setting in a Docker Defender running on Linux allows the Defender to function as what?
Docker DefenderContainer SecurityDocker APIProxy - Question #87Cloud Network Security
A customer wants to be notified about port scanning network activities in their environment. Which policy type detects this behavior?
Anomaly DetectionNetwork Security PoliciesPort Scanning - Question #88Cloud Compliance and Governance
A customer wants to harden its environment from misconfiguration. Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)
Prisma Cloud ComputeCompliance enforcementHost securityDocker security - Question #89Prisma Cloud Platform
A customer has a large environment that needs to upgrade Console without upgrading all Defenders at one time. What are two prerequisites prior to performing a rolling upgrade of De...
Prisma Cloud UpgradeDefender ManagementtwistcliVersion Compatibility - Question #90Security Operations and Incident Response
A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt The DevOps lead only has access to vulnerability data in Prisma Clou...
Prisma Cloud ComputeRuntime SecurityIncident ResponseContainer Audits - Question #91Container Security
What are two ways to scan container images in Jenkins pipelines? (Choose two )
Container Image ScanningJenkins PipelinePrisma CloudCI/CD Security - Question #92Prisma Cloud Platform
Per security requirements, an administrator needs to provide a list of people who are receiving e- mails for Prisma Cloud alerts. Where can the administrator locate this list of e-...
Prisma Cloud alertsAlert rulesNotification configurationEmail recipients - Question #93Prisma Cloud Platform
Which port should a security team use to pull data from Console's API?
Prisma Cloud Console APIAPI PortPort 8083Platform Interaction - Question #94Cloud Native Security
Which statement about build and run policies is true?
Build PoliciesIaC SecurityShift Left SecurityRuntime Policies - Question #95Cloud Native Security
A customer has a development environment with 50 connected Defenders. A maintenance window is set for Monday to upgrade 30 stand-alone Defenders in the development environment, but...
Defender UpgradeAgent ManagementPrisma Cloud OperationsMaintenance Window - Question #96Prisma Cloud Platform
A customer has configured the JIT, and the user created by the process is trying to log in to the Prisma Cloud console. The user encounters the following error message: What is the...
JIT ProvisioningPrisma Cloud User ManagementAttribute MappingAuthentication Errors - Question #97Container Security
What are the two ways to scope a CI policy for image scanning? (Choose two.)
container image scanningCI policypolicy scopingimage labels - Question #98Data Security
Which policy type in Prisma Cloud can protect against malware?
Prisma Cloud policiesMalware protectionData SecurityCloud storage security - Question #99Cloud Native Security
If you are required to run in an air-gapped environment, which product should you install?
Air-gapped deploymentPrisma Cloud ComputeDeployment modelsCloud-native security - Question #100Prisma Cloud Platform
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
Access keysUser managementRBACPrisma Cloud administration