Which two resources provide operational insight within the Prisma Cloud Asset Inventory? (Choose two.)
Which RQL string using network query attributes returns all traffic destined for Internet or for Suspicious IPs that also exceeds 1GB?
Prisma Public Cloud enables compliance monitoring and reporting by mapping which configurations to compliance standards?
Which two elements does Prisma Cloud monitor when analyzing for unusual user activity? (Choose two.)
Which two deployment methods are supported for Prisma Cloud Compute (PCC) container Defenders? (Choose two.)
Which three types of security checks can Prisma Public Cloud perform? (Choose three.)
Which regulatory framework in Prisma Cloud measures compliance with European Union (EU) data privacy regulations in Amazon Web services (AWS) workloads?
What are the two options to dynamically register tags used by Dynamic Address Groups that are referenced in policy? (Choose two.)
What is the default capacity license of a VM-Series NGFW being deployed from the Google Cloud Platform Marketplace?
Which statement explains the correlation between the block and alert thresholds in a vulnerability management policy?
Which statement is specific for Prisma Cloud when integrating into cloud environments?
Which Amazon Web Services security service can provide host vulnerability information to Prisma Public Cloud?
A customer CSO has asked you to demonstrate how to identify all "Amazon RDS" resources deployed and the region that they are deployed in. What are two ways that Prisma Public Cloud can show the relevant information?(Choose two.)
How can you use Prisma Public Cloud to identify Amazon EC2 instances that have been tagged as "Private?
What is the Palo Alto Networks default Prisma Cloud setting for Alert Disposition to reduce the number of false positives?
What is the Palo Alto Networks recommended setting for the Prisma Cloud Training Model Threshold?
Which type of alert captures unusual user activity and excessive login failures?
The VM-Series integration with Amazon GuardDuty feeds malicious IP addresses to the VM-Series NGFW using XML API to populate a Dynamic Address Group within a Security policy that blocks traffic.
How does Amazon Web Services achieve this integration?
Which two cloud providers support Load Balancers as next hop configurations for outbound connections? (Choose two.)
In which two ways does Palo Alto Networks VM orchestration help service providers automatically provision security instances and policies? (Choose two.)
Which subcommand invokes the scan for images built with Jenkins in an OpenShift environment?
A client has a sensitive internet-facing application server in Microsoft Azure and is concerned about resource exhaustion because of distributed denial-of-service attacks What can be configured on the VM-Series firewall to specifically protect this server against this type of attack?