Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

PSE-PrismaCloud Exam Dumps - PSE Palo Alto Networks System Engineer Professional - Prisma Cloud

Go to page:
Question # 17

Which two cloud providers support Load Balancers as next hop configurations for outbound connections? (Choose two.)

A.

Google Cloud Platform

B.

Microsoft Azure

C.

Oracle Cloud

D.

Amazon Web Services

Full Access
Question # 18

What occurs with the command twistcli when scanning images?

A.

If options are listed after the image name; they will be ignored.

B.

If option "--user" is used, it is mandatory to use option "--password.

C.

If option "--address" is unspecified, all images are scanned.

D.

Option "--output-file" cannot be used in conjunction with option "--details."

Full Access
Question # 19

What happens in Prisma Cloud after Training Model Threshold or Alert Disposition is changed?

A.

Changes will take effect after a new learning phase of 30 days.

B.

System will perform a reboot, deleting all past alerts.

C.

Existing alerts and new alerts are regenerated based on the new setting.

D.

New alerts are generated based on the new setting.

Full Access
Question # 20

Which two templates are supported by Cloud Code Security scan service? (Choose two.)

A.

Azure Resource Manager (ARM)

B.

Hyper Text Markup Language (HTML)

C.

GitHub

D.

Terraform

Full Access
Question # 21

Prevention against which type of attack is configurable in Web-Application and API Security (WAAS)?

A.

credential stuffing

B.

cross-site scripting (XSS)

C.

shoulder surfing

D.

distributed denial of service (DDoS)

Full Access
Question # 22

Which two statements are true about CloudFormation? (Choose two.)

A.

CloudFormation is a procedural configuration management tool.

B.

CloudFormation templates can be used on both Amazon Web Services and Microsoft Azure

C.

CloudFormation templates can be written in JSON or YAML

D.

CloudFormation is a declarative orchestration tool.

Full Access
Question # 23

What are two business values of Cloud Code Security? (Choose two.)

A.

consistent controls from build time to runtime

B.

prebuilt and customizable polices to detect data such as personally identifiable information (PII) in publicly exposed objects

C.

support for multiple languages, runtimes and frameworks

D.

continuous monitoring of all could resources for vulnerabilities, misconfigurations, and other threats

Full Access
Question # 24

Which three requirements are needed to register a PAYG VM-Series NGFW at the Palo Alto Networks Customer Support website? (Choose three.)

A.

Serial Number

B.

CPU ID

C.

Auth Code

D.

License Key

E.

UUID

Full Access
Go to page: