Which alert deposition severity must be chosen to generate low and high severity alerts in the Anomaly settings when user wants to report on an unknown browser and OS, impossible time travel, or both due to account hijacking attempts?
Which alert deposition severity must be chosen to generate low and high severity alerts in the Anomaly settings when user wants to report on an unknown browser and OS, impossible time travel, or both due to account hijacking attempts?A . High B. Aggressive C. Moderate D. ConservativeView AnswerAnswer: C
Which container scan is constructed correctly?
Which container scan is constructed correctly?A . twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 -- container myimage/latest B. twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest C. twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 --details myimage/latest D. twistcli images scan -u api -p api --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latestView AnswerAnswer:...
Which order of steps map a policy to a custom compliance standard?
DRAG DROP Which order of steps map a policy to a custom compliance standard? (Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer: Explanation:
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
A customer has a requirement to restrict any container from resolving the name www.evil-url.com. How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . Choose “copy into rule” for any Container, set www.evil-url.com as a blocklisted DNS name in the Container policy and set the policy effect...
Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)
Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)A . HTTP B. SSH C. Tomcat Web Connector via AJP D. TLSView AnswerAnswer: A,D
Which RQL query type is invalid?
Which RQL query type is invalid?A . Event B. IAM C. Incident D. ConfigView AnswerAnswer: B Explanation: RQL (Real-time Query Language) is a query language used to search, filter and analyze data in Prisma Cloud. The valid RQL query types are: ✑ Event: This type of query is used to...
Which two pieces of information do you need to onboard this account?
A customer wants to monitor the company’s AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now. Which two pieces of information do you need to onboard this account? (Choose two.)A . Cloudtrail B. Subscription ID C. Active Directory ID D. External ID E....
Which three steps are involved in onboarding an account for Data Security? (Choose three.)
Which three steps are involved in onboarding an account for Data Security? (Choose three.)A . Create a read-only role with in-line policies B. Create a Cloudtrail with SNS Topic C. Enable Flow Logs D. Enter the RoleARN and SNSARN E. Create a S3 bucketView AnswerAnswer: B,C,E
In which order should the API calls be used to accomplish this task?
DRAG DROP An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days. In which order should the API calls be used to accomplish this task? (Drag the steps into the correct order from the first step to the last.) Select...
Which RQL query type is invalid?
Which RQL query type is invalid?A . Event B. IAM C. Incident D. ConfigView AnswerAnswer: B Explanation: RQL (Real-time Query Language) is a query language used to search, filter and analyze data in Prisma Cloud. The valid RQL query types are: ✑ Event: This type of query is used to...