Pccse Study Guide
Pccse Study Guide
Prisma Certified
Cloud Security Engineer
Study Guide
June 2021
Palo Alto Networks, Inc.
www.paloaltonetworks.com
Overview
The PCCSE program is a formal, third-party proctored certification. Success on the PCCSE exam shows
that you possess the in-depth skills and knowledge needed to administer cloud solutions, including the
areas of:
• visibility
• data-loss prevention
Your success on the PCCSE exam demonstrates the highest standard of deployment methodology and
operational best practices associated with the Palo Alto Networks Prisma Cloud. The exam is not
intended to trick you or to test obscure detail. However, a nuanced understanding, and the ability to
make subtle technical distinctions, will help you choose better answers.
More information is available from the Palo Alto Networks Prisma public page:
https://docs.paloaltonetworks.com/prisma.html
https://docs.paloaltonetworks.com/prisma/prisma-cloud.html
The approximate distribution of items by topic (Exam Domain) and topic weightings are shown in the
following table.
100%
Preparation Resources
The document is a compilation of key resources to guide exam preparation. These resources cover the
material designated by the exam objectives. To study efficiently, focus on the suggested topics listed for
each resource. Be sure that you have a clear and complete understanding of these topics before you
take the exam.
1.1 Deploy and Manage the Console for the Compute Edition
For Prisma Cloud Compute, you can use a data-collection and user-interface platform hosted by Palo
Alto Networks. Or you can host your own console with software provided to you as a Docker image. See
the following links for more information.
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/install/twistlock_container_images.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/install/install_onebox.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/install/install_kubernetes.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/upgrade.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/install/defender_types.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/install/install_defender/install_single_container_defender.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/audit/host_activity
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/runtime_defense/runtime_defense_hosts
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/compliance/host_scanning
• https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/20-04/prisma-
cloud-compute-edition-admin/install/install_defender/install_serverless_defender.html
• https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/20-04/prisma-
cloud-compute-edition-admin/install/install_defender/install_serverless_defender_layer.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/install/install_defender/install_app_embedded_defender.html
• https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/20-04/prisma-
cloud-compute-edition-
admin/install/install_defender/install_app_embedded_defender_fargate.html
• https://docs.paloaltonetworks.com/content/techdocs/en_US/prisma/prisma-cloud/20-04/prisma-
cloud-compute-edition-
admin/install/install_defender/install_app_embedded_defender_pivotal_pas.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/install/getting_started.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/install/install_defender/install_single_container_defender.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/upgrade.html
In this task, you will validate that you can create and manage these policies.
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/compliance/compliance_explorer.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-04/prisma-cloud-compute-edition-
admin/compliance/manage_compliance.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-
policies/create-a-policy
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-rql-reference/rql-
reference.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-
policies/create-a-policy
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-alerts/view-respond-to-prisma-cloud-alerts.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-alerts/create-an-alert-rule.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-alerts/send-prisma-cloud-alert-notifications-to-third-party-tools.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-alerts/view-respond-to-prisma-cloud-alerts.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-alerts/generate-reports-on-prisma-cloud-alerts.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-alerts/alert-payload.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-alerts/risk-rating-for-a-resource.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/alerts/alert_mechanism.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/alerts/email.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/alerts/slack.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/configure-external-
integrations-on-prisma-cloud.html
1. Identify whether the relevant entity (virtual machine instance, Docker container, etc.) really has
been broken into. For example, a vulnerability could exist but never have been exploited.
2. If the entity has been broken into, identify the harm done and whether the entity itself was used
as a conduit for attacking other entities.
An investigation typically starts with an RQL query that shows details about what is happening in your
cloud environment.
Next, you can drill down for additional information about a specific data point, such as the query for the
cloudresourcemanager.googleapis.com in June 2020. This query returns a list of the items that were
aggregated. In this case, it is a list of events.
You can then click the eye icon on any line in the list for its full details.
2.7 Remediation
When Prisma Cloud detects a policy violation on a cloud resource, an alert is triggered. The alert is
presented in several locations, SecOps dashboard, Compliance Dashboards, Alerts page, Policy pages,
and results through Prisma Cloud investigations. Remediation is the process of resolving or clearing
alerts to bring a cloud resource back in compliance with a Prisma Cloud policy. Any policies associated
with the alert are referenced to aid in the remediation of alerts.
References
Configure Prisma Cloud to Automatically Remediate Alerts
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-cloud-
alerts/configure-prisma-cloud-to-automatically-remediate-alerts.html#id77ff61ca-a7ae-4830-9c47-
516c79be3f9a
Policy violations are captured in Prisma Cloud. However, the remediation happens on the respective
connected cloud account, (AWS, Azure, GCP, Alibaba, and OCI). Once the violation is remediated on the
connected cloud account, the alert will show remediated in Prisma Cloud.
2) Automatic Remediation – An automatic remediation is performed via an Alert Rule that is configured
with a remediable policy. No manual administrator actions are required. When Prisma Cloud detects a
policy violation, an alert is triggered. An associated Alert Rule automatically executes the CLI commands
defined under the remediable policy assigned to the Alert Rule.
2.8.1 Identify the process for onboarding cloud accounts with data protection
Prisma Cloud Data Security requires you to configure an AWS CloudTrail bucket. To save cost, ensure
that you follow the instructions to select only Write events instead of Read and Write events.
1. Protect against known vulnerabilities by scanning, updating, and removing libraries known to
contain those vulnerabilities.
3. Reduce the attack surface by deploying the Cloud Native Application Firewall (CNAF).
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/vulnerability_management/search_cves.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/vulnerability_management/vm_image_scanning.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/vulnerability_management/detect_vulns_unpackaged_software.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/vulnerability_management/cvss_scoring.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/manage_compliance.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/prisma_cloud_compliance_checks.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/custom_compliance_checks.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/extensible_compliance_checks.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/detect_secrets.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/manage_compliance.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/prisma_cloud_compliance_checks.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/windows.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/custom_compliance_checks.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/extensible_compliance_checks.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/host_scanning.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/runtime_defense/custom_runtime_rules.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/runtime_defense/runtime_defense_processes.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/runtime_defense/runtime_defense_networking.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/runtime_defense/runtime_defense_fs.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/runtime_defense/discrete_blocking.html
WAAS enhances the traditional WAF for container environments by binding itself to containerized web
apps. It can do this binding regardless of the cloud, orchestrator, node, or IP address where that
containerized web app is running and without configuring complicated routing. For non-containerized
web apps, WAAS simply binds to the host where the app runs.
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/vulnerability_management/search_cves.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/install/install_defender/install_serverless_defender_layer.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/waas/waas_api_protection.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/waas/waas_dos_protection.html
4.2.4 Configure access controls to enforce HTTP headers and file uploads
Access Control includes defining where your apps can be accessed from and whether the endpoints can
upload files. There are three Access Control parameters: Network Controls, HTTP headers, and File
Uploads.
Network Controls define your inbound-source IP addresses and inbound-source countries. You can set
control methods to either send an Alert or Prevent. For known or trusted endpoints, you can define
exception lists for inbound-source countries and IP addresses.
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/waas/waas_access_control.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/waas/waas_access_control.html
File Uploads
Configure WAAS to protect against malicious file uploads. Configure file uploads to explicitly allow file
extensions, while alerting or preventing other file extensions.
For each bot category, configure an Effect method of Alert, Prevent, or Ban.
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/waas/waas_bot_protection.html
The information in the configuration files is queried by means of a JSON query, even if those files are
written in a different standard, such as YAML.
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-
policies/create-a-policy/prisma-cloud-create-config-build-policy.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-
policies/create-a-policy/prisma-cloud-iac-scan-policy-operators.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/continuous_integration/jenkins_freestyle_project.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/continuous_integration/jenkins_maven_project.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/continuous_integration/jenkins_pipeline_project.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/continuous_integration/cloudbees_core_pipeline_k8s.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/continuous_integration/set_policy_ci_plugins.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-policy-
reference/configuration-policies/configuration-policies-build-phase.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/custom_compliance_checks.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/compliance/extensible_compliance_checks.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/connect-your-cloud-
platform-to-prisma-cloud/onboard-your-azure-account.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/connect-your-cloud-
platform-to-prisma-cloud/onboard-your-gcp-account.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-administrators/prisma-cloud-admin-permissions.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-administrators/manage-roles-in-prisma-cloud.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/authentication/prisma_cloud_user_roles.html
The Prisma Cloud Compute Open Policy Agent accepts policies from the user interface, converts them to
the Rego language, and uses them to decide whether to permit requests or reject them. If you need
more complicated processing, you can write Rego expressions and import them.
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/access_control/open_policy_agent.html
• https://www.openpolicyagent.org/docs/latest/
• https://www.openpolicyagent.org/docs/latest/policy-language/
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/audit.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/audit/audit_admin_activity
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/audit/host_activity.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-administrators/define-prisma-cloud-enterprise-settings
• https://blog.paloaltonetworks.com/2020/01/cloud-ueba/
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-
cloud-administrators/define-prisma-cloud-enterprise-settings#id5326b191-bf23-4545-bc05-
620d113bf54d_id6f5bd95c-b5b5-48bf-b397-312f4de3e08c
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/alerts/alert_mechanism.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/alerts/email.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/alerts/slack.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/configure-external-
integrations-on-prisma-cloud.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/audit/annotate_audits.html
• https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/audit/logging.html
• https://cdn.twistlock.com/docs/api/twistlock_api.html#authenticate_client
• https://cdn.twistlock.com/docs/api/twistlock_api.html
• https://cdn.twistlock.com/docs/api/twistlock_api.html#policies
• https://cdn.twistlock.com/docs/api/twistlock_api.html#hosts
• https://cdn.twistlock.com/docs/api/twistlock_api.html#images
• https://cdn.twistlock.com/docs/api/twistlock_api.html#pcf_droplets
• https://cdn.twistlock.com/docs/api/twistlock_api.html#registry
• https://cdn.twistlock.com/docs/api/twistlock_api.html#scans
• https://cdn.twistlock.com/docs/api/twistlock_api.html#serverless
• https://cdn.twistlock.com/docs/api/twistlock_api.html#containers
• https://cdn.twistlock.com/docs/api/twistlock_api.html#hosts
• https://cdn.twistlock.com/docs/api/twistlock_api.html#images
• https://cdn.twistlock.com/docs/api/twistlock_api.html#pcf_droplets
• https://cdn.twistlock.com/docs/api/twistlock_api.html#registry
• https://cdn.twistlock.com/docs/api/twistlock_api.html#scans
• https://cdn.twistlock.com/docs/api/twistlock_api.html#serverless
1. Which registry do you use to download the Prisma Cloud Compute Defender image?
a. registry.redlock.com
b. registry.twistlock.com
c. registry.prisma.com
d. registry.paloaltonetworks.com
2. What is a valid tag for a Prisma Cloud Compute Docker image?
a. defender_20.04.177
b. defender.20.04.177
c. defender_20_04_177
d. defender-20-04-177
3. An organization that uses a private cloud in a black site that has no internet connection can
use which product?
a. Google Cloud
b. AWS S3 Management.
c. Prisma Cloud Compute
d. Prisma Cloud
4. In Prisma Cloud Compute, what is the default HTTPS port for the Console?
a. 443
b. 8083
c. 8443
d. 9443
5. What is the name of the configuration file that controls a Onebox configuration?
a. twistlock.cfg
b. twistlock.json
c. redlock.cfg
d. redlock.json
6. In which format does the twistcli create the configuration file for the Console when using
Kubernetes?
a. JSON
b. YAML
c. XML
d. CSV
7. What are the two external items that need to be deployed in Kubernetes together with a
console? (Choose two.)
a. a database (DB) to store the console’s state
b. a load balancer, which is used to expose the console to the network
c. an ephemeral volume (EV) for the console’s temporary data
d. a Kubernetes authorization engine to make sure only authorized administrators use
the console
e. a persistent volume (PV) to store the console’s state
17. Which serverless platform is supported by the serverless layer deployment type?
a. AWS Lambda
b. GCP Cloud
c. GCP On-Premises
d. Azure
18. Which three runtimes are supported by the serverless Defender? (Choose three.)
a. PowerShell
b. Ruby
c. Node.js
d. C#
e. Python
19. Which three serverless platforms are supported by the serverless embedded deployment
type? (Choose three.)
a. AWS Lambda
b. GCP Cloud
c. GCP On-Premises
d. Azure Functions
e. Google App Engine
22. How do alerts propagate from the Defenders to the Console in Kubernetes?
a. Pull, the console connects to port 8083 on the Defender.
b. Pull, the console connects to port 8084 on the Defender.
c. Push, the Defender connects to port 8083 on the console.
d. Push, the Defender connects to port 8084 on the console.
23. What is the usual order of upgrades if you use a self-hosted console in Prisma Cloud Compute?
a. The console identifies that there’s a new version, upgrades itself automatically, and
then upgrades the Defenders automatically.
b. The console identifies that there’s a new version and upgrades itself automatically.
You then upgrade the Defenders manually during a scheduled maintenance
window.
c. You upgrade the console manually, and then it upgrades the Defenders
automatically.
d. You upgrade both the console and Defenders manually.
25. How many queries can a policy include? How many standards?
a. one query, one standard
b. one query, multiple standards
c. multiple queries, one standard
d. multiple queries, multiple standards
26. Which three protocols are identified by the following RQL query? (Choose three.)
a. protocol='TCP' AND dest.port IN (21,23,80) AND source.publicnetwork IN ( 'Internet IPs' ,
'Suspicious IPs' )
b. HTTP
c. Telnet
d. SSH
e. HTTPS
f. FTP
27. Which parameter can you use in RQL to look at a field that Prisma Cloud does not parse?
a. config.external
b. json.value
c. json.rule
d. config.internal
30. What is the alert state after the next scan when Prisma Cloud detects that excessive access
was allowed to an AWS S3 bucket?
a. Open
b. Resolved
c. Closed
d. Deleted
31. Which two alert states would be used by an administrator that is trying to hide the alerts
caused by their actions? (Choose two.)
a. Open
b. Resolved
c. Snoozed
d. Dismissed
e. Closed
Investigate alerts
35. How should an administrator respond to an alert opened at 2 a.m. and resolved at 4 a.m.
a. Verify the Alert log file to gather additional information to investigate the
occurrence in detail.
b. Investigate further. Somebody may have disabled a safeguard at 2 a.m., committed
a crime, and re-enabled it at 4 a.m. to avoid detection.
c. Evidence of malware is clear. The administrator must shut down the system in
which it occurred.
d. Document the incident. If it happens multiple times it needs to be investigated.
41. You suspect that the desktop at IP 6.6.6.6 has malware. Which event query will show whether
malware performed any cloud activity on your instances?
a. event where sourceIP IN ( 6.6.6.6 )
b. event where ip IN ( 6.6.6.6 )
c. event where inetIP IN ( 6.6.6.6 )
d. event where adminIP IN ( 6.6.6.6 )
42. You type this query: event where user = 'root'. Where would the events you see originate?
a. AWS
b. Azure
c. GCP
d. Google Cloud
43. You suspect that the desktop at 6.6.6.6 has malware. Which two queries will show whether it
contacted any suspicious IPs? (Choose two.)
a. network where source.ip = 6.6.6.6 AND dest.publicnetwork = 'Suspicious IPs'
b. network where source.ip = 6.6.6.6 AND dest.ip IN ('Suspicious IPs')
c. network where source.publicnetwork = 'Suspicious IPs' AND dest.ip = 6.6.6.6
d. network where source.ip = 'Suspicious IPs' AND dest.ip = 6.6.6.6
e. network where source.ip = 6.6.6.6 OR dest.ip = 6.6.6.6
44. Which traffic will the following query identify?
a. dest.resource IN ( resource where virtualnetwork.name != 'default' )
b. IP addresses of resources that are in the virtual network default
c. IP addresses of resources that are not in the virtual network default
d. traffic events where the destination is in the virtual network default
e. traffic events where the destination is not in the virtual network default
47. In a Prisma Cloud asset inventory, which is not an option for the Assets by Classification
widget?
a. Cloud Type (AWK, Alibaba Cloud, GCP, Azure)
b. Asset Type (Instance, Network, Database, etc.)
c. Account Name
d. Region
48. Which two criteria can be used to filter the asset inventory? (Choose two.)
a. Resource Type
b. CIDR Network Block
c. Resource Name
d. Standard
e. IP Type (Internal vs. External)
49. Which two template types are supported by build rules? (Choose two.)
a. JavaScript
b. CloudFormation
c. Bash scripts with configuration commands
d. Terraform
e. XML
50. Which type of query do you use to validate that a build policy is being followed?
a. SQL query
b. JavaScript code to calculate the answer
c. RQL
d. JSON query
51. Your auditor wants a weekly report of how compliant you were with SOC 2. Can you do it, and
if so how?
a. No. You can get only current compliance.
b. You can automate it from the web interface.
c. Do a GET
https://api.prismacloud.io/compliance/posture?timeType=relative&timeAmount=<
<n>>&timeUnit=week&policy.complianceStandard=SOC%202, loop on <<n>>
d. Do a GET https://api.prismacloud.io/compliance/SOC
2?timeType=relative&timeAmount=<<n>>_weeks, loop on <<n>>
52. How can you delete Audit log entries older than a year?
a. Audit log entries are not under administrator control.
b. You can do it from the web interface.
c. Do a DELETE
https://api.prismacloud.io/audit/redlock?timeType=relative&timeAmount=1&time
Unit=year
d. Do a DELETE
https://api.prismacloud.io/audit/redlock?timeType=absolute&time=<<one year ago,
in ISO 8601 notation, YYYY-MM-DD>>
55. Which of these is not a tab in the registry details for a Docker image?
a. Layers
b. Process Info
c. Network Connections
d. Packages
58. Which type of virtual machine can Prisma Cloud scan without running an agent on it?
a. Amazon Machine Image (AMI) running Linux
b. Amazon Machine Image (AMI) running Linux or Windows
c. Any VM image on the three major cloud providers (AWS, Azure, and GCP) running
Linux
d. Any VM image on the three major cloud providers (AWS, Azure, and GCP) running
Windows
60. Which image vulnerability policy field is not available in Host Vulnerability policies?
a. Alert threshold
b. Block threshold
c. Apply rule only when vendor fixes are available
d. Exceptions
61. Which two criteria can you use for exceptions in a Host Vulnerability policy? (Choose two.)
a. CVE ID
b. OS version
c. Is there a vendor fix available?
d. Severity
e. Tag
62. If a Docker image raises a high-severity compliance concern, what is the first digit of the
compliance ID?
a. 2
b. 3
c. 4
d. 5
63. If a Docker container raises a medium-severity compliance concern, what is the first digit of
the compliance ID?
a. 2
b. 3
c. 4
d. 5
67. Which category and type identify the compliance problem described in the following
statement?
“While the system administrator can establish secure permissions for users’ home directories,
the users can easily override these.”
a. Windows, host
b. Linux, host
c. Docker, daemon config
d. Apache, daemon config
68. Which entity creates the host compliance policies that Prisma Cloud checks?
a. Palo Alto Networks research department
b. Center for Internet Security
c. Committee for Information Safety
d. National Institute of Standards and Technology
69. Which two fields can be used to limit the scope of a host compliance rule? (Choose two.)
a. Operating system
b. Tag
c. Account ID
d. Host name
e. Project ID
70. If you keep the default policy, what action is performed on each severity level?
a. Low: Ignore, Medium: Alert, High: Alert, Critical: Block
b. Low: Ignore, Medium: Alert, High: Alert, Critical: Alert
c. Low: Ignore, Medium: Ignore, High: Alert, Critical: Block
d. Low: Ignore, Medium: Ignore, High: Alert, Critical: Alert
71. An application has five hosts that run 30 Docker containers based on 10 images. What is the
total number of container models in the application?
a. 5
b. 10
c. 20
d. 30
72. Which is not a tab in the container model?
a. Process
b. Networking
c. File System
d. Memory
73. Which tab does not have a Prevent effect in a container runtime rule?
a. Processes
b. Networking
c. File system
d. Operations
74. Which container-runtime effect applies to a single action rather than to an entire container?
a. Alert
b. Prevent
c. Block
d. Delete
75. Which Docker storage driver, does not support Prevent effects?
a. devicemapper
b. overlay2
c. aufs
d. virtualmapper
76. When does Prisma Cloud Compute gather forensic information about containers?
a. all the time
b. at the time of a breach
c. at the time of a breach and for a short time afterward
d. at the time of the breach and for 10 minutes
77. Which time period is covered by the forensic information sent to the console?
a. all the time
b. the time of a breach and a short period before it
c. the time of a breach and a short period afterward
d. a short period before the time of a breach and a short period afterward
78. In Prisma Cloud Compute, which three languages can have their packages scanned for
vulnerabilities in serverless? (Choose three.)
a. JavaScript (Node.js)
b. Go
c. C#
d. Rust
e. Python
f. Java
81. What two scope restrictions can a serverless vulnerability policy have? (Choose two.)
a. Runtimes
b. Functions
c. Cloud Platforms
d. Account IDs
e. Trigger Types
82. Which two effects can an exception to a Vulnerability policy rule have? (Choose two.)
a. Disable
b. Ignore
c. Alert
d. Prevent
e. Block
83. In Prisma Cloud Compute, which two languages are not supported for the serverless
Defender? (Choose two.)
a. JavaScript (Node.js)
b. Go
c. C#
d. Rust
e. Python
85. What type of event do you need to log for DLP to work?
a. Read
b. Write
c. Upload
d. Download
86. Which cloud service can use DLP?
a. AWS S3
b. Azure Blob
c. Google Cloud
d. Google Cloud Messaging
87. How does Prisma Cloud get information about new files that need to be checked for DLP?
a. AWS SNS
b. Azure Event Grid
c. Google Messaging
d. HTTP to a Prisma Cloud web hook
90. What is not an exposure level that would apply to a storage bucket?
a. Public
b. Partial
c. Conditional
d. Private
93. Which protocol or protocols does the Cloud Native Application Firewall (CNAF) process?
a. LDAP
b. SSL
c. SSH
d. HTTP
100. Which HTTP method is used to request the scan results for a Terraform template?
a. GET
b. POST
c. PUT
d. DELETE
101. What is the content-type value use to scan a single YAML CloudFormation template file?
a. text/plain
b. text/x-yaml
c. application/yaml
d. application/plain
102. The OOTB policy to verify that versioning is turned on in AWS S3 buckets is applied to which
two code options? (Choose two.)
a. CloudFormation
b. Terraform
c. CloudField
d. Kubernetes
103. The OOTB policy to verify that versioning is turned on in GCP Storage log buckets is applied to
which code option?
a. CloudFormation
b. Terraform
c. CloudField
d. Kubernetes
106. Which CI/CD software communicates with Prisma Cloud Compute to request scans of new
container images?
a. Jenkins
b. Maven
c. Freestyle
d. Malware
107. Which kind of relationship is allowed between the Console release and the Jenkins plugin
release?
a. The Jenkins plugin can be the same release as the Console or newer.
b. The Jenkins plugin and the Console must be the same release.
c. The Console can be the same release as the Jenkins release or newer.
d. Any version of the Jenkins plugin works with any version of the Console.
108. How do you configure communications between Jenkins (with the plugin) and the Prisma
Console?
a. The plugin you install has the Console identity and the account to use on it.
b. You configure the console identity and authentication on Jenkins.
c. You configure the Jenkins identity and authentication on the Console.
d. On each side (Jenkins and Prism Console) you need to configure the identity and
authentication for the other side.
109. What is the return code of twistcli if the image passes the test?
a. -1
b. 0
c. 1
d. 2
110. At what point does a twistcli scan check the image?
a. before the image is created
b. after the image is created
c. after the image is deployed
d. before the image is created
111. Which two policy types are valid for CI, before the image is deployed? (Choose two.)
a. Compliance
b. Network Event
c. Vulnerability
d. Audit
e. Access
112. What is the earliest stage of the toolchain where Prisma Cloud Compute can protect you?
a. Coding
b. Building
c. Testing
d. Deploying
113. Which option shows the types of cloud accounts supported by Prisma Cloud?
a. AWS and Azure
b. AWS, Azure, and GCP
c. AWS, Azure, GCP, and Alibaba
d. AWS, Azure, GCP, Alibaba, and IBM Cloud
115. What is the relationship between cloud accounts and account groups?
a. One to one. Each account group has exactly one cloud account.
b. One to many. Each account group has multiple cloud accounts, but a cloud account
can be in only one group.
c. One to many. Each account has multiple accounts groups, but a group can include at
most one account.
d. Many to many. Each account can be a member of multiple account groups, and each
group can contain multiple accounts.
116. What are the two ways in which account groups are used? (Choose two.)
a. Prisma Cloud > Compliance, to see the compliance status of a specific group (for
example, apps that process credit cards)
b. Prisma Cloud > Policies, to specify on which accounts groups Prisma Cloud can use
auto remediation for each policy
c. Prisma Cloud Compute > Radar (one of the options to color different containers and
serverless functions is by account group)
d. Prisma Cloud Compute > Defend > Vulnerabilities; you can ask to get a report of all
the vulnerabilities of a specific account group
e. in the security roles, to permit users to access only specific account groups
117. An administrator has a Prisma Cloud role of Account Group Admin. What is the administrator’s
role in Prisma Cloud Compute?
a. also Account Group Admin because they use the same roles
b. Auditor
c. DevSecOps User
d. Defender Manager
119. Which role in Prisma Cloud Compute do you give a team lead from development permission to
see only continuous integration reports?
a. CI User
b. DevOps User
c. DevSecOps User
d. Auditor
120. An employee from Operations who works the night shift needs to be able to see everything in
case of problems but should not be able to change anything. Which role do you assign in
Prisma Cloud Compute?
a. CI User
b. DevOps User
c. DevSecOps User
d. Auditor
121. Which type of Defender installation do you need for an admission controller?
a. Single Defender
b. DaemonSet
c. Swarm
d. Multiple Defender DaemonSet
122. Which is the name of the file you apply to Kubernetes to install OPA?
a. admin_ctrl.yaml
b. opa.yaml
c. webhook.yaml
d. opa.json
125. Users connect to the Console through app.prismacloud.io. Which Audit log has the IP of the
user that connected to it?
a. Prisma Cloud
b. Prisma Cloud Compute
c. Prisma Cloud Log
d. Prisma Cloud Compute Log
127. Which two values are legitimate entries in an anomaly trusted list? (Choose two.)
a. 10.0.0.0/8
b. 2.2.2.2/16
c. 8.8.8.8
d. [email protected]
e. 172.16.1.1/32
128. Which three criteria can be used to limit the applicability of an anomaly trusted list? (Choose
three.)
a. Anomaly policy type(s)
b. Account ID
c. VPC
d. Subnet
e. DNS Domain
129. What is the maximum idle timeout without using a custom value?
a. 30 minutes
b. 45 minutes
c. 60 minutes
d. 120 minutes
130. When you set a custom idle timeout, which units can you use?
a. minutes
b. hours
c. days
d. months
134. Where in the user interface do you specify integrations for Prisma Cloud to alert other
products?
a. Settings > Integrations
b. Manage > Alerts
c. Prisma Cloud Settings > Integrations
d. Prisma Cloud Manage > Alerts
135. Where do you configure outbound notifications for CNAF?
a. Settings > Integrations
b. Manage > Alerts
c. Prisma Cloud Settings > Integrations
d. Manage > CNAF > Alerts
136. You want to test an alert channel using /api/v1/alert-profiles/test. Which format should you
use?
a. GET
b. JSON
c. YAML
d. Python
API: The application program interface (API) is the interface that a program exposes to other programs.
App Embedded: App embedded is a way to install (embed) Prisma Cloud Defenders inside an
application’s Docker containers.
Application Firewall: An application firewall is a firewall built to understand and protect a specific
application protocol, for example, HTTP.
Asset: An asset is any system that is used as part of a business application. In the cloud it can be a virtual
machine, a Docker container, a serverless function, a database hosted by the provider, etc.
AWS Lambda: AWS Lambda is Amazon’s serverless product. It is distinguished from the competition by
the availability of a layer feature that lets you wrap the serverless functions with other functions, such
as a Prisma Cloud Defender.
Build Time: Build time is the integration process that takes written code and turns it into a running
application.
CI/CD: Continuous integration/continuous delivery is an automated process for building, running, and
monitoring applications.
CloudFormation: CloudFormation is an Amazon program that takes configuration files and connects
them to an AWS account to provision the infrastructure in the way specified by those files.
Compliance: Compliance relates to a set of rules (or standards) defined by an industry, government, or
regulatory body that must be followed to ensure that a certain level of security is being established and
maintained.
Console: A console is the user interface that allows an administrator to interact with a product. For
Prisma Cloud Compute the user interface can be a SaaS offering or hosted by the organization that
bought Prisma Cloud Compute. In Prisma Cloud the user interface is always a SaaS solution.
Defenders: Defenders are software entities that Prisma Cloud Compute uses to secure hosts, containers,
and serverless functions.
Docker Image: A Docker image is software packaged for deployment in the form of a Docker container.
For more information, visit https://docs.docker.com/engine/reference/commandline/image/.
Firewall: A firewall is a system that monitors the communications (ingress and egress) between
components and approves, rejects, or modifies the information being communicated in accordance with
predefined policies.
GCP: Google Cloud Platform (GCP) is Google’s cloud product. For more information, visit:
https://cloud.google.com/
Google Cloud Functions: Google Cloud Functions is Google’s serverless product. For more information,
visit:
https://cloud.google.com/functions
Host: A host is the compute platform being used to run software. In relation to Prisma Cloud, the host
runs either Docker or a virtual machine.
Infrastructure as Code (IaC): Infrastructure as code (IaC) specifies the configuration of the
infrastructure, such as its network topology and server configurations, as a text file. For more
information, visit:
https://en.wikipedia.org/wiki/Infrastructure_as_code
Integration: Integration is the process of setting two or more systems up to communicate with one
another for some purpose. For example, Prisma Cloud can be integrated with Slack to propagate alerts
to a Slack channel.
Jenkins: Jenkins is open source software for CI/CD. For more information, visit https://www.jenkins.io/.
JSON: JSON is a textual format used for computer information. For more information, visit:
https://en.wikipedia.org/wiki/JSON
Kubernetes: Kubernetes is an open source system that allows the management of multiple Docker
installations running on separate computers (or virtual machines). For more information, visit:
https://kubernetes.io/
Microsoft Azure Functions: Microsoft Azure Functions is Microsoft’s serverless product. For more
information, visit:
https://azure.microsoft.com/en-us/services/functions/
Out-of-the-box (OOTB): Out-of-the-box (OOTB) is software, policies, or configurations that are provided
with a product, for example, the security policies that come with Prisma Cloud.
Role-Based Access Control (RBAC): Role-based access control (RBAC) is offered by a system that can
map users to roles and then apply policies that enforce a set of permissions for each role.
Rego: Rego is a language used to query JSON data structures in the Prisma Cloud Computes OPA, which
acts as the admission controller for Kubernetes.
Role: A role is the job function that a user fulfills. It often is tied to the permissions that the user is
granted so that they can fulfill their function.
Resource Query Language (RQL): The Resource Query Language (RQL) is language used by Prisma Cloud
to query different resources.
Runtime Environment: The runtime environment is the software and libraries that form the
environment for an application.
Software as a Service (SaaS): Software as a service (SaaS) is software that runs on infrastructure
managed by a provider and used by another organization through the internet. For more information,
visit:
https://en.wikipedia.org/wiki/Software_as_a_service
Serverless: Serverless is a method of running software in which the cloud provider is responsible for the
hardware, virtual machine, container, and runtime. The consuming organization is responsible only for
the functions that are called to implement the application’s functionality.
Terraform: Terraform is an open source program that takes configuration files and connects them to a
cloud account to provision the infrastructure in the way specified by those files. For more information,
visit:
https://www.terraform.io/
User and entity behavior analytics (UEBA): User and entity behavior analytics (UEBA) is technology that
identifies and alerts on user behavior that deviates (is anomalous) from what is normal or expected.
Vulnerability: A vulnerability is a software bug that allows users to abuse the system in some way. Those
vulnerabilities often exist not directly in the application software but in the libraries that the software
uses.
Workload: A workload is software running on an asset that implements part of a business application.
YAML: YAML is a text format used for computer information. For more details, visit:
https://yaml.org/