Which container scan is constructed correctly?
A customer wants to monitor the company’s AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now.
Which two pieces of information do you need to onboard this account? (Choose two.)
The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.
Which type of policy should be created to protect this pod from Layer7 attacks?
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely.
Which strategy should the administrator use to achieve this goal?
Which two statements are true about the differences between build and run config policies? (Choose two.)
Given the following audit event activity snippet:
Which RQL will be triggered by the audit event?
A)
B)
C)
D)
You are tasked with configuring a Prisma Cloud build policy for Terraform. What type of query is necessary to complete this policy?
The Prisma Cloud administrator has configured a new policy.
Which steps should be used to assign this policy to a compliance standard?
Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)
Given this information:
The Console is located at https://prisma-console.mydomain.local The username is: cluster
The password is: password123
The image to scan is: myimage:latest
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?
How are the following categorized?
Backdoor account access Hijacked processes Lateral movement
Port scanning
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
A security team has been asked to create a custom policy.
Which two methods can the team use to accomplish this goal? (Choose two.)
A customer has serverless functions that are deployed in multiple clouds.
Which serverless cloud provider is covered be “overly permissive service access” compliance check?
Match the correct scanning mode for each given operation.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)