What is the behavior of Defenders when the Console is unreachable during upgrades?
Console is running in a Kubernetes cluster, and Defenders need to be deployed on nodes within this cluster.
How should the Defenders in Kubernetes be deployed using the default Console service name?
Which IAM RQL query would correctly generate an output to view users who enabled console access with both access keys and passwords?
Which of the following are correct statements regarding the use of access keys? (Choose two.)
If you are required to run in an air-gapped environment, which product should you install?
A customer has a requirement to scan serverless functions for vulnerabilities.
Which three settings are required to configure serverless scanning? (Choose three.)
An organization wants to be notified immediately to any “High Severity” alerts for the account group “Clinical Trials” via Slack.
Which option shows the steps the organization can use to achieve this goal?
Given the following information, which twistcli command should be run if an administrator were to exec into a running container and scan it from within using an access token for authentication?
• Console is located at https://prisma-console.mydomain.local
• Token is: TOKEN_VALUE
• Report ID is: REPORTJD
• Container image running is: myimage:latest
In Azure, what permissions need to be added to Management Groups to allow Prisma Cloud to calculate net effective permissions?
On which cloud service providers can new API release information for Prisma Cloud be received?
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
Which two bot categories belong to unknown bots under Web-Application and API Security (WAAS) bot protection? (Choose two.)
Which RQL query will help create a custom identity and access management (1AM) policy to alert on Lambda functions that have permission to terminate EC2 instances?
Which set of steps is the correct process for obtaining Console images for Prisma Cloud Compute Edition?
An administrator needs to detect and alert on any activities performed by a root account.
Which policy type should be used?
A customer has multiple violations in the environment including:
User namespace is enabled
An LDAP server is enabled
SSH root is enabled
Which section of Console should the administrator use to review these findings?
A customer's Security Operations Center (SOC) team wants to receive alerts from Prisma Cloud via email once a day about all policies that have a violation, rather than receiving an alert every time a new violation occurs.
Which alert rule configuration meets this requirement?
The security team wants to protect a web application container from an SQLi attack. Which type of policy should the administrator create to protect the container?
An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.
What does the administrator need to configure?
An administrator for Prisma Cloud needs to obtain a graphical view to monitor all connections, including connections across hosts and connections to any configured network objects.
Which setting does the administrator enable or configure to accomplish this task?
You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant’s existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.
Which option shows the steps required during the alert rule creation process to achieve this objective?
Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.
Where should the customer navigate in Console?
Which API calls can scan an image named myimage: latest with twistcli and then retrieve the results from Console?
Given the following JSON query:
$.resource[*].aws_s3_bucket exists
Which tab is the correct place to add the JSON query when creating a Config policy?
Which two frequency options are available to create a compliance report within the console? (Choose two.)
Which two statements are true about the differences between build and run config policies? (Choose two.)
The security team wants to enable the “block” option under compliance checks on the host.
What effect will this option have if it violates the compliance check?
A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80.
Which port should the team specify in the CNAF rule to protect the application?
A customer wants to harden its environment from misconfiguration.
Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)
During an initial deployment of Prisma Cloud Compute, the customer sees vulnerabilities in their environment.
Which statement correctly describes the default vulnerability policy?
Put the steps of integrating Okta with Prisma Cloud in the right order in relation to CIEM or SSO okra integration.
Which step is included when configuring Kubernetes to use Prisma Cloud Compute as an admission controller?
Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?
Which two elements are included in the audit trail section of the asset detail view? (Choose two).
The development team wants to fail CI jobs where a specific CVE is contained within the image. How should the development team configure the pipeline or policy to produce this outcome?
Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.
Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?
Which two statements explain differences between build and run config policies? (Choose two.)
Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).
An administrator has a requirement to ingest all Console and Defender logs to Splunk.
Which option will satisfy this requirement in Prisma Cloud Compute?
Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)
Which resources can be added in scope while creating a vulnerability policy for continuous integration?
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
Given the following audit event activity snippet:
Which RQL will be triggered by the audit event?
A)
B)
C)
D)
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?
A customer has a requirement to scan serverless functions for vulnerabilities.
What is the correct option to configure scanning?
Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)
Which serverless cloud provider is covered by the "overly permissive service access" compliance check?
The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.
Which type of policy should be created to protect this pod from Layer7 attacks?
The administrator wants to review the Console audit logs from within the Console.
Which page in the Console should the administrator use to review this data, if it can be reviewed at all?
Given this information:
The Console is located at https://prisma-console.mydomain.local The username is: cluster
The password is: password123
The image to scan is: myimage:latest
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
What factor is not used in calculating the net effective permissions for a resource in AWS?
What is required for Prisma Cloud to successfully execute auto-remediation commands?
An administrator sees that a runtime audit has been generated for a host. The audit message is:
“Service postfix attempted to obtain capability SHELL by executing /bin/sh /usr/libexec/postfix/postfix- script.stop. Low severity audit, event is automatically added to the runtime model”
Which runtime host policy rule is the root cause for this runtime audit?
Which component(s), if any, will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?
A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)
Which three actions are available for the container image scanning compliance rule? (Choose three.)