Which order of steps map a policy to a custom compliance standard?
DRAG DROP Which order of steps map a policy to a custom compliance standard? (Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer:
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
Given this information: •. The Console is located at https//prisma-console mydomain local •. The username is ciuser •. The password is password123 •. The Image to scan is myimage latest Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?A ....
Which options show the steps required after upgrade of Console?
Which options show the steps required after upgrade of Console?A . Update the Console image in the Twistlock hosted registry Update the Defender image in the Twistlock hosted registry Uninstall DefendersB . Update the Console image in the Twistlock hosted registry Update the Defender image in the Twistlock hosted registry...
Which "kind" of Kubernetes object that is configured to ensure that Defender is acting as the admission controller?
Which "kind" of Kubernetes object that is configured to ensure that Defender is acting as the admission controller?A . PodSecurityPoliciesB . DestinationRulesC . ValidatingWebhookConfigurationD . MutatingWebhookConfigurationView AnswerAnswer: D
Which component(s), if any will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?
Which component(s), if any will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?A . DefendersB . twistcliC . ConsoleD . JenkinsView AnswerAnswer: B
Match the service on the right that evaluates each exposure type on the left
DRAG DROP Match the service on the right that evaluates each exposure type on the left. (Select your answer from the pull-down list. Answers may be used more than once or not at all.) View AnswerAnswer:
Which three types of bucket exposure are available in the Data Security module? (Choose three.)
Which three types of bucket exposure are available in the Data Security module? (Choose three.)A . DifferentialB . PublicC . ConditionalD . PrivateE . InternationalView AnswerAnswer: A,C,E