PCCSE Practice Questions
258 real PCCSE exam questions with expert-verified answers and explanations. Page 5 of 6.
- Question #201Container Security
What are the three states of the Container Runtime Model? (Choose three.)
Container Runtime ModelRuntime ProtectionWorkload StatesContainer Security - Question #202Security Operations and Incident Response
What must be created in order to receive notifications about alerts generated when the operator is away from the Prisma Cloud Console?
Prisma CloudAlertingNotificationsConfiguration - Question #203Prisma Cloud Platform
Which alerts are fixed by enablement of automated remediation?
Automated RemediationAlert ManagementPrisma CloudSecurity Automation - Question #204Container Security
Which two statements apply to the Defender type Container Defender - Linux?
Prisma Cloud DefenderContainer Runtime ProtectionDeployment ArchitectureUserspace - Question #205Prisma Cloud Platform
Which field is required during the creation of a custom config query?
Prisma CloudRQLCustom PoliciesConfiguration Security - Question #206Prisma Cloud Platform
Which role must be assigned to DevOps users who need access to deploy Container and Host Defenders in Compute?
Prisma Cloud RBACDefender DeploymentContainer SecurityHost Security - Question #207Serverless Security
Which three serverless runtimes are supported by Prisma Cloud for vulnerability and compliance scans? (Choose three.)
Prisma CloudServerless SecurityVulnerability & Compliance ScanningSupported Runtimes - Question #208Cloud Infrastructure Entitlement Management (CIEM)
Which IAM Azure RQL query would correctly generate an output to view users who have sufficient permissions to create security groups within Azure AD and create applications?
RQLAzure ADIAMPrisma Cloud - Question #209Cloud Infrastructure Entitlement Management (CIEM)
Which two variables must be modified to achieve automatic remediation for identity and access management (IAM) alerts in Azure cloud? (Choose two.)
Automatic RemediationIAM SecurityAzure SecurityCloud Automation - Question #210Container Security
Which container scan is constructed correctly?
Prisma Cloud CLIContainer Image ScanningVulnerability ManagementCLI Authentication - Question #211Prisma Cloud Platform
Which RQL will trigger the following audit event activity?
RQLAudit LogsCloud Security MonitoringRoot User Access - Question #212Prisma Cloud Platform
Which report includes an executive summary and a list of policy violations, including a page with details for each policy?
Prisma Cloud ReportingPolicy ViolationsReport TypesSecurity Posture Management - Question #213Prisma Cloud Platform
Prisma Cloud Compute has been installed on Onebox. After Prisma Cloud Console has been accessed. Defender is disconnected and keeps returning the error "No console connectivity" in...
Prisma Cloud ComputeDefender-Console communicationNetwork portsTroubleshooting - Question #214Cloud Compliance and Governance
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
Prisma Cloud Adoption AdvisorCSPMCloud GovernanceCompliance - Question #215Prisma Cloud Platform
A customer wants to monitor its Amazon Web Services (AWS) accounts via Prisma Cloud, but only needs the resource configuration to be monitored at present. Which two pieces of infor...
Prisma Cloud OnboardingAWS IntegrationResource Configuration MonitoringCross-Account Roles - Question #216Cloud Network Security
Which policy type should be used to detect and alert on cryptominer network activity?
Anomaly detectionThreat detectionCryptominingNetwork security policies - Question #217Container Security
Given the following information, which twistcli command should be run if an administrator were to exec into a running container and scan it from within using an access token for au...
twistcliContainer ScanningCLI CommandsPrisma Cloud - Question #218Prisma Cloud Platform
Prisma Cloud supports which three external systems that allow the import of vulnerabilities and provide additional context on risks in the cloud? (Choose three.)
Prisma Cloud integrationsVulnerability managementCloud risk contextExternal data sources - Question #219Cloud Native Security
Which two statements explain differences between build and run config policies? (Choose two.)
Build-time securityRun-time securityIaC securityMisconfiguration management - Question #220Application Security
Which two integrated development environment (IDE) plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
IDE SecurityCode SecurityPrisma CloudDeveloper Tools - Question #221Cloud Compliance and Governance
Creation of a new custom compliance standard that is based on other individual custom compliance standards needs to be automated. Assuming the necessary data from other standards h...
Prisma Cloud APICompliance AutomationCustom StandardsREST API - Question #222Cloud Compliance and Governance
Which of the following is a reason for alert dismissal?
Alert ManagementPrisma CloudPolicy EnforcementSecurity Posture Management - Question #223Prisma Cloud Platform
A customer's Security Operations Center (SOC) team wants to receive alerts from Prisma Cloud via email once a day about all policies that have a violation, rather than receiving an...
Prisma Cloud AlertingPolicy ViolationsNotification ConfigurationDaily Digests - Question #224Cloud Compliance and Governance
In which Console menu would an administrator verify whether a custom compliance check is failing or passing?
Prisma Cloud ConsoleCompliance MonitoringCustom Compliance ChecksUI Navigation - Question #225Cloud Native Security
Which three Orchestrator types are supported when deploying Defender? (Choose three.)
Container OrchestrationPrisma Cloud DefenderSupported Platforms - Question #226Prisma Cloud Platform
Which three platforms support the twistcli tool? (Choose three.)
twistcliPrisma CloudSupported PlatformsOperating Systems - Question #227Cloud Compliance and Governance
Which three options for hardening a customer environment against misconfiguration are included in Prisma Cloud Compute compliance enforcement for hosts? (Choose three.)
Prisma Cloud ComputeHost SecurityCompliance EnforcementMisconfiguration Prevention - Question #228Prisma Cloud Platform
Taking which action will automatically enable all seventy levels?
Prisma Cloud UIEnterprise SettingsAlert ConfigurationSeverity Levels - Question #229Application Security
Which two CI/CD plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
Prisma Cloud Code SecurityCI/CD IntegrationDevSecOpsIaC Security - Question #230Cloud Network Security
Which policy type provides information about connections from suspicious IPs in a customer database?
Anomaly DetectionSecurity PoliciesNetwork SecurityThreat Detection - Question #231Prisma Cloud Platform
Where can a user submit an external new feature request?
PCCSE CertificationPalo Alto Networks ProceduresFeature RequestProduct Feedback - Question #232Prisma Cloud Platform
What improves product operationalization by adding visibility into feature utilization and missed opportunities?
Product operationalizationFeature utilizationAdoption AdvisorPrisma Cloud - Question #233Prisma Cloud Platform
Prisma Cloud supports sending audit event records to which three targets? (Choose three.)
Audit LoggingEvent ForwardingCloud-Native MonitoringPlatform Integrations - Question #234Cloud Infrastructure Entitlement Management (CIEM)
In Prisma Cloud for Azure Net Effective Permissions Calculation, the following Azure permission levels are supported by which three permissions? (Choose three.)
Azure PermissionsEffective Permissions CalculationPrisma Cloud CIEMAzure Resource Hierarchy - Question #235Security Operations and Incident Response
What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?
Prisma Cloud Compute MonitoringIncident ExplorerEvent CorrelationAttack Detection - Question #236Cloud Native Security
What is a benefit of the Cloud Discovery feature?
Cloud DiscoveryCloud VisibilityAsset InventoryContinuous Monitoring - Question #237Prisma Cloud Platform
What are the subtypes of configuration policies in Prisma Cloud?
Prisma Cloud PoliciesConfiguration PoliciesBuild PoliciesRun Policies - Question #238Cloud Infrastructure Entitlement Management (CIEM)
What factor is not used in calculating the net effective permissions for a resource in AWS?
AWS IAMEffective PermissionsPermission BoundariesService Control Policies (SCPs) - Question #239Prisma Cloud Platform
A Systems Engineer is the administrator of a self-hosted Prisma Cloud console. They upgraded the console to the latest version. However, after the upgrade, the console does not sho...
Prisma Cloud administrationBackup and restoreVersion compatibilityUpgrade management - Question #240Prisma Cloud Platform
Which statement applies to Adoption Advisor?
Adoption AdvisorPrisma CloudCloud Security CapabilitiesCSPM - Question #241Container Security
Which resources can be added in scope while creating a vulnerability policy for continuous integration?
Vulnerability PolicyCI/CD SecurityContainer ImagesPolicy Scoping - Question #242Container Security
A container and image compliance rule has been configured by enabling all checks; however, upon review, the container's compliance view reveals only the entries in the image below....
Container compliancePrisma Cloud rulesCompliance reportingContainer image security - Question #243Cloud Native Security
What is the primary purpose of Prisma Cloud Code Security?
Prisma Cloud Code SecurityShift-Left SecurityIaC SecurityMisconfiguration Prevention - Question #244Prisma Cloud Platform
How does assigning an account group to an administrative user on Prisma Cloud help restrict access to resources?
Prisma Cloud Access ControlAccount Group ManagementUser PermissionsResource Scoping - Question #245Cloud Infrastructure Entitlement Management (CIEM)
Which three AWS policy types and identities are used to calculate the net effective permissions? (Choose three.)
AWS IAMEffective PermissionsService Control PoliciesAccess Control - Question #246Cloud Network Security
Based on the following information, which RQL query will satisfy the requirement to identify VM hosts deployed to organization public cloud environments exposed to network traffic...
RQLNetwork Flow LogsHost Vulnerability ManagementInternet Exposure - Question #247Security Operations and Incident Response
Which of the following is not a supported external integration for receiving Prisma Cloud Code Security notifications?
Prisma CloudCode SecurityIntegrationsNotifications - Question #248Cloud Compliance and Governance
Which type of RQL query should be run to determine if AWS Elastic Compute Cloud (EC2) instances without encryption was enabled?
RQL QueriesAWS EC2 SecurityConfiguration ManagementCloud Security Posture - Question #249Prisma Cloud Platform
Which RQL query is used to detect certain high-risk activities executed by a root user in AWS?
RQLCloud AuditingAWS SecurityPrisma Cloud - Question #250Prisma Cloud Platform
What is required for Prisma Cloud to successfully execute auto-remediation commands?
Prisma CloudAuto-remediationCloud Platform AccessWrite Permissions