Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)

Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)A . Install boto3 & requests library. B. Configure IAM Azure remediation script. C. Integrate with...

February 27, 2023 No Comments READ MORE +

Where can Defender debug logs be viewed? (Choose two.)

Where can Defender debug logs be viewed? (Choose two.)A . /var/lib/twistlock/defender.log B. From the Console, Manage > Defenders > Manage > Defenders. Select the Defender from the deployed Defenders list, then click Actions > Logs C. From the Console, Manage > Defenders > Deploy > Defenders. Select the Defender from...

February 27, 2023 No Comments READ MORE +

Which options show the steps required to upgrade Console when using projects?

Which options show the steps required to upgrade Console when using projects?A . Upgrade all Supervisor Consoles Upgrade Central Console B. Upgrade Central Console Upgrade Central Console Defenders C. Upgrade Defender Upgrade Central Console Upgrade Supervisor Consoles D. Upgrade Central Console Upgrade all Supervisor ConsolesView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-09/prisma-cloud-compute-edition-admin/upgrade/upgrade_process.html

February 26, 2023 No Comments READ MORE +

How often do Defenders share logs with Console?

How often do Defenders share logs with Console?A . Every 10 minutes B. Every 30 minutes C. Every 1 hour D. Real timeView AnswerAnswer: C

February 26, 2023 No Comments READ MORE +

Which strategy should the administrator use to achieve this goal?

The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely. Which strategy should the administrator use to achieve this goal?A . Disable the policy B....

February 26, 2023 No Comments READ MORE +

Which option shows the steps to install the Console in a Kubernetes Cluster?

Which option shows the steps to install the Console in a Kubernetes Cluster?A . Download the Console and Defender image Generate YAML for Defender Deploy Defender YAML using kubectl B. Download and extract release tarball Generate YAML for Console Deploy Console YAML using kubectl C. Download the Console and Defender...

February 26, 2023 No Comments READ MORE +

Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?

A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company’s AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded...

February 25, 2023 No Comments READ MORE +

What are the three states of the Container Runtime Model? (Choose three.)

What are the three states of the Container Runtime Model? (Choose three.)A . Initiating B. Learning C. Active D. Running E. ArchivedView AnswerAnswer: A,D,E

February 25, 2023 No Comments READ MORE +

What effect will this option have if it violates the compliance check?

The security team wants to enable the “block” option under compliance checks on the host. What effect will this option have if it violates the compliance check?A . The host will be taken offline. B. Additional hosts will be prevented form starting. C. Containers on a host will be stopped....

February 25, 2023 No Comments READ MORE +

Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?

Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?A . Visibility, Compliance, Governance, and Threat Detection and Response B. Network, Anomaly, and Audit Event C. Visibility, Security, and Compliance D. Foundations, Advanced, and OptimizeView AnswerAnswer: A Explanation: The Adoption Advisor uses four categories...

February 25, 2023 No Comments READ MORE +