Which port should the team specify in the CNAF rule to protect the application?
A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80. Which port should the team specify in the CNAF rule to protect the application?A...
Which RQL query type is invalid?
Which RQL query type is invalid?A . Event B. IAM C. Incident D. ConfigView AnswerAnswer: B Explanation: RQL (Real-time Query Language) is a query language used to search, filter and analyze data in Prisma Cloud. The valid RQL query types are: ✑ Event: This type of query is used to...
Which two filters are available in the SecOps dashboard? (Choose two.)
Which two filters are available in the SecOps dashboard? (Choose two.)A . Time range B. Account Groups C. Service Name D. Cloud RegionView AnswerAnswer: A,B
Which two required request headers interface with Prisma Cloud API? (Choose two.)
Which two required request headers interface with Prisma Cloud API? (Choose two.)A . Content-type:application/json B. x-redlock-auth C. >x-redlock-request-id D. Content-type:application/xmlView AnswerAnswer: A,B Explanation: Reference: https://prisma.pan.dev/api/cloud/api-headers/
Which action would be applicable after enabling anomalous compute provisioning?
Which action would be applicable after enabling anomalous compute provisioning?A . It detects the activity caused by the spambot. B. It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment. C. It detects potential creation of an unauthorized network of compute...
The exclamation mark on the resource explorer page would represent?
The exclamation mark on the resource explorer page would represent?A . resource has been deleted B. the resource was modified recently C. resource has alerts D. resource has compliance violationView AnswerAnswer: B
What is the order of steps in a Jenkins pipeline scan?
DRAG DROP What is the order of steps in a Jenkins pipeline scan? (Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer: Explanation: Table Description automatically generated with medium confidence
What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?
What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?A . Go to Settings > Data > Snippet Masking and select Full Mask. B. Go to Settings > Data > Data Patterns, search for...
Which command generates the YAML file for Defender install?
An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to YAML. Console Address: $CONSOLE_ADDRESS Websocket Address: $WEBSOCKET_ADDRESS User: $ADMIN_USER Which command generates the YAML file for Defender install?A . <PLATFORM>/twistcli defender --address...
What type of query is necessary to complete this policy?
You are tasked with configuring a Prisma Cloud build policy for Terraform. What type of query is necessary to complete this policy?A . YAML B. JSON C. CloudFormation D. TerraformView AnswerAnswer: B Explanation: Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/create-a-policy/prisma-cloud-create-config-build-policy.html