A customer has a requirement to scan serverless functions for vulnerabilities.
Which three settings are required to configure serverless scanning? (Choose three.)
What factor is not used in calculating the net effective permissions for a resource in AWS?
What is the behavior of Defenders when the Console is unreachable during upgrades?
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?
Which two statements are true about the differences between build and run config policies? (Choose two.)
An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant.
In which order will the APIs be executed for this service?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?
An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type A”.
Why would this message appear as an audit?
Which three actions are required in order to use the automated method within Azure Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose three.)
Which of the following are correct statements regarding the use of access keys? (Choose two.)
An administrator has added a Cloud account on Prisma Cloud and then deleted it.
What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?
A customer has Prisma Cloud Enterprise and host Defenders deployed.
What are two options that allow an administrator to upgrade Defenders? (Choose two.)
A customer wants to harden its environment from misconfiguration.
Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)
The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.
Which type of policy should be created to protect this pod from Layer7 attacks?
A Prisma Cloud Administrator onboarded an AWS cloud account with agentless scanning enabled successfully to Prisma Cloud. Which item requires deploying defenders to be able to inspect the risk on the onboarded AWS account?
Which component of a Kubernetes setup can approve, modify, or reject administrative requests?
On which cloud service providers can new API release information for Prisma Cloud be received?
Which two CI/CD plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
Which resources can be added in scope while creating a vulnerability policy for continuous integration?
A customer wants to monitor the company’s AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now.
Which two pieces of information do you need to onboard this account? (Choose two.)
An administrator of Prisma Cloud wants to enable role-based access control for Docker engine.
Which configuration step is needed first to accomplish this task?
Which action would be applicable after enabling anomalous compute provisioning?
Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)
An administrator wants to retrieve the compliance policies for images scanned in a continuous integration (CI) pipeline.
Which endpoint will successfully execute to enable access to the images via API?
Which Prisma Cloud policy type detects port scanning activities in a customer environment?
The administrator wants to review the Console audit logs from within the Console.
Which page in the Console should the administrator use to review this data, if it can be reviewed at all?
Which two offerings will scan container images in Jenkins pipelines? (Choose two.)
A customer has a requirement to automatically protect all Lambda functions with runtime protection. What is the process to automatically protect all the Lambda functions?
The security team wants to target a CNAF policy for specific running Containers. How should the administrator scope the policy to target the Containers?
In which Console menu would an administrator verify whether a custom compliance check is failing or passing?
Which set of steps is the correct process for obtaining Console images for Prisma Cloud Compute Edition?
Which type of query is used for scanning Infrastructure as Code (laC) templates?
Which two of the following are required to be entered on the IdP side when setting up SSO in Prisma Cloud? (Choose two.)
Which three Orchestrator types are supported when deploying Defender? (Choose three.)
A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80.
Which port should the team specify in the CNAF rule to protect the application?
How does assigning an account group to an administrative user on Prisma Cloud help restrict access to resources?
Which two services require external notifications to be enabled for policy violations in the Prisma Cloud environment? (Choose two.)
In Prisma Cloud for Azure Net Effective Permissions Calculation, the following Azure permission levels are supported by which three permissions? (Choose three).
Which two variables must be modified to achieve automatic remediation for identity and access management (IAM) alerts in Azure cloud? (Choose two.)
Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts.
Where can the administrator locate this list of e-mail recipients?
You are tasked with configuring a Prisma Cloud build policy for Terraform. What type of query is necessary to complete this policy?
Prisma Cloud supports sending audit event records to which three targets? (Choose three.)
A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt. The DevOps lead only has access to vulnerability data in Prisma Cloud Compute, so the DevOps lead passes this information to SecOps.
Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?
Which ban for DoS protection will enforce a rate limit for users who are unable to post five (5) “. tar.gz" files within five (5) seconds?
A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?
On which cloud service providers can you receive new API release information for Prisma Cloud?
Given the following information, which twistcli command should be run if an administrator were to exec into a running container and scan it from within using an access token for authentication?
• Console is located at https://prisma-console.mydomain.local
• Token is: TOKEN_VALUE
• Report ID is: REPORTJD
• Container image running is: myimage:latest
Creation of a new custom compliance standard that is based on other individual custom compliance standards needs to be automated.
Assuming the necessary data from other standards has been collected, which API order should be used for this new compliance standard?
Which three serverless runtimes are supported by Prisma Cloud for vulnerability and compliance scans? (Choose three.)
What are two key requirements for integrating Okta with Prisma Cloud when multiple Amazon Web Services (AWS) cloud accounts are being used? (Choose two.)
Which of the following is not a supported external integration for receiving Prisma Cloud Code Security notifications?
Given this information:
The Console is located at https://prisma-console.mydomain.local The username is: cluster
The password is: password123
The image to scan is: myimage:latest
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
A security team has been asked to create a custom policy.
Which two methods can the team use to accomplish this goal? (Choose two.)
One of the resources on the network has triggered an alert for a Default Config policy.
Given the following resource JSON snippet:
Which RQL detected the vulnerability?
A)
B)
C)
D)
While writing a custom RQL with array objects in the investigate page, which type of auto-suggestion a user can leverage?
A customer's Security Operations Center (SOC) team wants to receive alerts from Prisma Cloud via email once a day about all policies that have a violation, rather than receiving an alert every time a new violation occurs.
Which alert rule configuration meets this requirement?
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
Which two processes ensure that builds can function after a Console upgrade? (Choose two.)
An administrator sees that a runtime audit has been generated for a container.
The audit message is:
“/bin/ls launched and is explicitly blocked in the runtime rule. Full command: ls -latr”
Which protection in the runtime rule would cause this audit?
Given the following RQL:
Which audit event snippet is identified by the RQL?
A)
B)
C)
D)
Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).
A customer has a large environment that needs to upgrade Console without upgrading all Defenders at one time.
What are two prerequisites prior to performing a rolling upgrade of Defenders? (Choose two.)
A user from an organization is unable to log in to Prisma Cloud Console after having logged in the previous day.
Which area on the Console will provide input on this issue?
Which statement is true about obtaining Console images for Prisma Cloud Compute Edition?