01. An engineer observes that runtime alerts are not being generated despite suspicious activity. What is the MOST likely cause?
a) Detection or monitoring configuration is incomplete
b) Dashboard visualization settings are inconsistent
c) Endpoint policies are not properly assigned
d) IAM roles are restricting access
02. A security team wants to reduce application risk before deployment by enforcing preventive controls in the development lifecycle. Which two application security practices best support this goal?
(Choose 2)
a) Network traffic inspection
b) Runtime workload protection
c) Secrets scanning/
d) Cloud Detection and Response
e) Infrastructure as Code (IaC) security
03. A Cortex Cloud deployment generates many false positives shortly after onboarding new data sources. Which factor is most likely responsible?
a) Excessive dashboard usage
b) Poorly tuned detection logic
c) Long log retention periods
d) Insufficient threat intelligence
04. Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default. Where should the customer navigate in Console?
a) Custom > Compliance
b) Defend > Compliance
c) Manage > Compliance
d) Monitor > Compliance
05. A posture assessment identifies multiple misconfigurations, but the security team struggles to decide which issues to remediate first. Which factor should most strongly influence remediation prioritization?
a) Risk severity and asset criticality
b) Cloud provider type
c) Total number of findings
d) Compliance framework alignment
06. A SOC team observes discrepancies between reports and dashboards for the same data set. What is the MOST likely cause?
a) Detection rules are not aligned with normalized data
b) Differences in report queries and dashboard filters
c) Endpoint policies are not properly assigned
d) Broker VM connectivity is not properly configured
07. Which component is responsible for processing and analyzing ingested data?
a) Dashboard visualization module
b) Broker VM integration module
c) Endpoint prevention profile manager
d) Cortex analytics engine
08. A cloud runtime security solution detects suspicious outbound connections from a workload. Which two data points are most critical for confirming malicious behavior?
(Choose 2)
a) Destination IP or domain reputation
b) CPU utilization trends
c) Resource tagging metadata
d) Compliance policy alignment
e) Process execution context
09. A security architect wants consistent enforcement of regulatory requirements across multiple cloud environments using a single framework. Which cloud posture capability directly supports this goal?
a) Agentless scanning
b) Runtime policy enforcement
c) Unified compliance management
d) Cloud Detection and Response
10. After responding to a cloud security incident involving unauthorized access to sensitive workloads, a SOC conducts a structured post-incident review. During the review, analysts focus on why detection was delayed and why escalation paths were unclear. What is the primary objective of this type of post-incident review in a mature SOC?
a) Identifying individual analyst performance issues
b) Improving detection logic and response processes
c) Producing evidence for regulatory audits
d) Validating the effectiveness of automated controls