PCCSE Practice Questions
258 real PCCSE exam questions with expert-verified answers and explanations. Page 4 of 6.
- Question #151Cloud Native Security
Which action would be applicable after enabling anomalous compute provisioning?
Anomalous ProvisioningCloud Resource SecurityThreat DetectionCompute Instance - Question #152Prisma Cloud Platform
What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?
Prisma CloudAWS IntegrationExternal IDTrust Relationship - Question #153Cloud Infrastructure Entitlement Management (CIEM)
Which IAM RQL query would correctly generate an output to view users who enabled console access with both access keys and passwords?
RQLIAM SecurityPrisma CloudAzure AD - Question #154Application Security
Which two bot types are part of Web Application and API Security (WAAS) bot protection? (Choose two.)
WAASBot ProtectionBot CategorizationApplication Security Features - Question #155Cloud Infrastructure Entitlement Management (CIEM)
Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access...
AWS RemediationIAM SecurityCloud Automationboto3 - Question #156Prisma Cloud Platform
Which three public cloud providers are supported for VM image scanning? (Choose three.)
VM image scanningPublic cloud providersPrisma CloudCloud security - Question #157Cloud Native Security
Where can Defender debug logs be viewed? (Choose two.)
Defender logsPrisma Cloud ConsoleFile pathsTroubleshooting - Question #158Prisma Cloud Platform
How many CLI remediation commands can be added in a custom policy sequence?
Custom PoliciesRemediation CommandsCLI RemediationPolicy Configuration - Question #159Cloud Compliance and Governance
An administrator wants to retrieve the compliance policies for images scanned in a continuous integration (CI) pipeline. Which endpoint will successfully execute to enable access t...
API EndpointsCompliance PoliciesContainer Image SecurityCI/CD Security - Question #160Cloud Network Security
The attempted bytes count displays?
Network Security MetricsTraffic DenialsCloud FirewallSecurity Groups - Question #161Security Operations and Incident Response
Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
Anomaly DetectionSecurity LogsNetwork SecurityUser Activity Monitoring - Question #162Prisma Cloud Platform
What are two alarm types that are registered after alarms are enabled? (Choose two.)
Prisma Cloud AlarmsPlatform Health MonitoringCloud Account ConnectivityExternal Integration Status - Question #163Data Security
What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?
Snippet MaskingData SecuritySensitive Data Protection - Question #164Prisma Cloud Platform
Which two integrations enable ingesting host findings to generate alerts? (Choose two.)
IntegrationsHost FindingsVulnerability ManagementAlerting - Question #165Data Security
Which data storage type is supported by Prisma Cloud Data Security?
Prisma Cloud Data SecurityAWS S3Cloud Storage Support - Question #166Prisma Cloud Platform
Which action must be taken to enable a user to interact programmatically with the Prisma Cloud APIs and for a nonhuman entity to be enabled for the access keys?
Prisma Cloud APIService AccountsProgrammatic AccessRole-Based Access Control - Question #167Prisma Cloud Platform
Which three types of runtime rules can be created? (Choose three.)
Runtime securityWorkload protectionPrisma CloudSecurity policies - Question #168Prisma Cloud Platform
Who can access saved searches in a cloud account?
Access ControlUser PermissionsPrisma Cloud AdministrationSaved Searches - Question #169Container Security
The Compute Console has recently been upgraded, and the administrator plans to delay upgrading the Defenders and the Twistcli tool until some of the team's resources have been resc...
Prisma Cloud ComputeVersion CompatibilityUpgrade ProcessDefenders - Question #170Cloud Infrastructure Entitlement Management (CIEM)
What are two key requirements for integrating Okta with Prisma Cloud when multiple Amazon Web Services (AWS) cloud accounts are being used? (Choose two.)
Okta integrationPrisma Cloud setupMulti-account AWSIAM security module - Question #171Cloud Infrastructure Entitlement Management (CIEM)
Which resource and policy type are used to calculate AWS Net Effective Permissions? (Choose two.)
AWS Effective PermissionsService Control PoliciesLambda FunctionsCIEM - Question #172Prisma Cloud Platform
When an alert notification from the alarm center is deleted, how many hours will a similar alarm be suppressed by default?
Alert managementAlarm suppressionDefault settingsPlatform configuration - Question #173Cloud Native Security
Which component of a Kubernetes setup can approve, modify, or reject administrative requests?
KubernetesAdmission ControllerAPI ServerCloud Native Security - Question #174Container Security
Which three actions are available for the container image scanning compliance rule? (Choose three.)
Container image scanningCompliance rulesPrisma Cloud actions - Question #175Prisma Cloud Platform
What will happen when a Prisma Cloud Administrator has configured agentless scanning in an environment that also has Host and Container Defenders deployed?
Prisma CloudAgentless ScanningDefender CoexistenceHost and Container Security - Question #176Container Security
An administrator of Prisma Cloud wants to enable role-based access control for Docker engine. Which configuration step is needed first to accomplish this task?
Prisma Cloud DefenderDocker RBACAPI ProxyListener Configuration - Question #177Cloud Compliance and Governance
Which of the below actions would indicate ?"The timestamp on the compliance dashboard?
Compliance DashboardData AggregationTimestamp Interpretation - Question #178Container Security
During the Learning phase of the Container Runtime Model, Prisma Cloud enters a "dry run" period for how many hours?
Prisma Cloud Container RuntimeLearning PhaseDry Run PeriodContainer Security - Question #179Cloud Native Security
Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)
Prisma Cloud Runtime DefenseCloud Workload ProtectionThreat DetectionIncident Explorer - Question #180Prisma Cloud Platform
Which two filters are available in the SecOps dashboard? (Choose two.)
SecOps dashboardPrisma Cloud filtersUI featuresAccount Groups - Question #181Cloud Native Security
Under which tactic is "Exploit Public-Facing Application" categorized in the ATT&CK framework?
MITRE ATT&CKInitial AccessExploit Public-Facing ApplicationCloud Native Security - Question #182Security Operations and Incident Response
Which alert deposition severity must be chosen to generate low and high severity alerts in the Anomaly settings when user wants to report on an unknown browser and OS, impossible t...
Anomaly DetectionUser Behavior AnalyticsAccount Takeover ProtectionAlert Configuration - Question #183Security Operations and Incident Response
A user from an organization is unable to log in to Prisma Cloud Console after having logged in the previous day. Which area on the Console will provide input on this issue?
Audit logsLogin troubleshootingPrisma Cloud ConsoleUser access issues - Question #184Prisma Cloud Platform
What happens when a role is deleted in Prisma Cloud?
Role ManagementAccess KeysPrisma Cloud APIIntegrations - Question #185Container Security
What is the default namespace created by Defender DaemonSet during deployment?
Prisma Cloud ComputeKubernetesDaemonSetNamespaces - Question #186Application Security
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)
Prisma Cloud WAASOWASP Top 10Web Application SecurityVulnerability Protection - Question #187Prisma Cloud Platform
Which of the following is displayed in the asset inventory?
Asset InventoryCloud ResourcesPrisma Cloud UIVisibility - Question #188Cloud Compliance and Governance
What is the frequency to create a compliance report? (Choose two.)
Compliance ReportingReport FrequencyCloud Compliance - Question #189Prisma Cloud Platform
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
SSOIdentity ProviderPrisma Cloud ConfigurationIdentity Management - Question #190Security Operations and Incident Response
Which two services require external notifications to be enabled for policy violations in the Prisma Cloud environment? (Choose two.)
Prisma Cloud NotificationsExternal IntegrationsPolicy Violation AlertingSIEM Integration - Question #191Prisma Cloud Platform
While writing a custom RQL with array objects in the investigate page, which type of auto- suggestion a user can leverage?
Prisma Cloud RQLInvestigate PageUI FeaturesAuto-suggestion - Question #192Data Security
Which file extension type is supported for Malware scanning in Prisma Cloud Data Security (PCDS)?
Malware ScanningPrisma Cloud Data SecuritySupported File Types - Question #193Application Security
Which two bot categories belong to unknown bots under Web-Application and API Security (WAAS) bot protection? (Choose two.)
Bot ProtectionWAASUnknown BotsApplication Security - Question #194Application Security
In WAAS Access control file upload controls, which three file types are supported out of the box? (Choose three.)
WAAS File UploadWeb Application SecurityPrisma Cloud WAASAccess Control - Question #195Prisma Cloud Platform
What are two built-in RBAC permission groups for Prisma Cloud? (Choose two.)
Prisma Cloud RBACBuilt-in RolesPermission GroupsAccess Control - Question #196Prisma Cloud Platform
Which role does Prisma Cloud play when configuring SSO?
SSOPrisma CloudService ProviderAuthentication - Question #197Container Security
Which Defender type performs registry scanning?
Prisma Cloud DefenderContainer SecurityRegistry ScanningVulnerability Management - Question #198Prisma Cloud Platform
The exclamation mark on the resource explorer page would represent?
Prisma Cloud UIResource ExplorerAlertsCSPM features - Question #199Container Security
Where are Top Critical CVEs for deployed images found?
Prisma Cloud UIVulnerability ManagementContainer Image SecurityCVEs - Question #200Cloud Compliance and Governance
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
Adoption AdvisorCSPMCloud SecuritySecurity Posture