Prisma Cloud supports sending audit event records to which three targets? (Choose three.)
What is the most reliable and extensive source for documentation on Prisma Cloud APIs?
On which cloud service providers can new API release information for Prisma Cloud be received?
One of the resources on the network has triggered an alert for a Default Config policy.
Given the following resource JSON snippet:
Which RQL detected the vulnerability?
A)
B)
C)
D)
Which two CI/CD plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
Which IAM RQL query would correctly generate an output to view users who enabled console access with both access keys and passwords?
Which ban for DoS protection will enforce a rate limit for users who are unable to post five (5) “. tar.gz" files within five (5) seconds?
Which two statements are true about the differences between build and run config policies? (Choose two.)
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
An administrator has a requirement to ingest all Console and Defender logs to Splunk.
Which option will satisfy this requirement in Prisma Cloud Compute?
Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.
Where should the customer navigate in Console?
An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days.
In which order should the API calls be used to accomplish this task? (Drag the steps into the correct order from the first step to the last.) Select and Place:
A customer has serverless functions that are deployed in multiple clouds.
Which serverless cloud provider is covered be “overly permissive service access” compliance check?
Which two services require external notifications to be enabled for policy violations in the Prisma Cloud environment? (Choose two.)
A customer has multiple violations in the environment including:
User namespace is enabled
An LDAP server is enabled
SSH root is enabled
Which section of Console should the administrator use to review these findings?
Which two bot types are part of Web Application and API Security (WAAS) bot protection? (Choose two.)
A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt. The DevOps lead only has access to vulnerability data in Prisma Cloud Compute, so the DevOps lead passes this information to SecOps.
Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?
A Prisma Cloud Administrator onboarded an AWS cloud account with agentless scanning enabled successfully to Prisma Cloud. Which item requires deploying defenders to be able to inspect the risk on the onboarded AWS account?
Which command should be used in the Prisma Cloud twistcli tool to scan the nginx:latest image for vulnerabilities and compliance issues?
A)
B)
C)
D)
Which three AWS policy types and identities are used to calculate the net effective permissions? (Choose three).
Given the following JSON query:
$.resource[*].aws_s3_bucket exists
Which tab is the correct place to add the JSON query when creating a Config policy?
Match the correct scanning mode for each given operation.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?
A customer has Prisma Cloud Enterprise and host Defenders deployed.
What are two options that allow an administrator to upgrade Defenders? (Choose two.)
The development team wants to fail CI jobs where a specific CVE is contained within the image. How should the development team configure the pipeline or policy to produce this outcome?
An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type A”.
Why would this message appear as an audit?
What are two alarm types that are registered after alarms are enabled? (Choose two.)
A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
How are the following categorized?
Backdoor account access Hijacked processes Lateral movement
Port scanning
Order the steps involved in onboarding an AWS Account for use with Data Security feature.
Given the following RQL:
event from cloud.audit_logs where operation IN (‘CreateCryptoKey’, ‘DestroyCryptoKeyVersion’, ‘v1.compute.disks.createSnapshot’)
Which audit event snippet is identified?
A)
B)
C)
D)
Which API calls can scan an image named myimage: latest with twistcli and then retrieve the results from Console?
A customer finds that an open alert from the previous day has been resolved. No auto-remediation was configured.
Which two reasons explain this change in alert status? (Choose two.)
What is the behavior of Defenders when the Console is unreachable during upgrades?
During the Learning phase of the Container Runtime Model, Prisma Cloud enters a “dry run” period for how many hours?
A customer wants to monitor the company’s AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now.
Which two pieces of information do you need to onboard this account? (Choose two.)
In which two ways can Prisma Cloud images be retrieved in Prisma Cloud Compute Self-Hosted Edition? (Choose two.)
Which three options are selectable in a CI policy for image scanning with Jenkins or twistcli? (Choose three.)
An administrator sees that a runtime audit has been generated for a host. The audit message is:
“Service postfix attempted to obtain capability SHELL by executing /bin/sh /usr/libexec/postfix/postfix- script.stop. Low severity audit, event is automatically added to the runtime model”
Which runtime host policy rule is the root cause for this runtime audit?
The Compute Console has recently been upgraded, and the administrator plans to delay upgrading the Defenders and the Twistcli tool until some of the team’s resources have been rescaled. The Console is currently one major release ahead.
What will happen as a result of the Console upgrade?
How does assigning an account group to an administrative user on Prisma Cloud help restrict access to resources?
Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts.
Where can the administrator locate this list of e-mail recipients?
An administrator needs to detect and alert on any activities performed by a root account.
Which policy type should be used?
A customer has a requirement to restrict any container from resolving the name www.evil-url.com.
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
Which two elements are included in the audit trail section of the asset detail view? (Choose two).
A customer wants to harden its environment from misconfiguration.
Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)
Which order of steps map a policy to a custom compliance standard?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Which RQL query will help create a custom identity and access management (1AM) policy to alert on Lambda functions that have permission to terminate EC2 instances?
Which three serverless runtimes are supported by Prisma Cloud for vulnerability and compliance scans? (Choose three.)
Which file extension type is supported for Malware scanning in Prisma Cloud Data Security (PCDS)?
Which statement is true about obtaining Console images for Prisma Cloud Compute Edition?