Which steps should be used to assign this policy to a compliance standard?
The Prisma Cloud administrator has configured a new policy. Which steps should be used to assign this policy to a compliance standard?A . Edit the policy, go to step 3 (Compliance Standards), click + at the bottom, select the compliance standard, fill in the other boxes, and then click Confirm....
What is the default namespace created by Defender DaemonSet during deployment?
What is the default namespace created by Defender DaemonSet during deployment?A . Redlock B. Defender C. Twistlock D. DefaultView AnswerAnswer: B
What is the behavior of Defenders when the Console is unreachable during upgrades?
What is the behavior of Defenders when the Console is unreachable during upgrades?A . Defenders continue to alert, but not enforce, using the policies and settings most recently cached before upgrading the Console. B. Defenders will fail closed until the web-socket can be re-established. C. Defenders will fail open until...
In which order will the APIs be executed for this service?
DRAG DROP An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant. In which order will the APIs be executed for this service? (Drag the steps into the correct order of occurrence, from the first step to...
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)A . DoS Protection B. Local file inclusion C. SQL injection D. Suspicious binary E. ShellshockView AnswerAnswer: A,C,D
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed. How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . set the Container model to manual relearn and set the default runtime rule to block for process protection....
Which order of steps map a policy to a custom compliance standard?
DRAG DROP Which order of steps map a policy to a custom compliance standard? (Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer: Explanation:
Which two integrations enable ingesting host findings to generate alerts? (Choose two.)
Which two integrations enable ingesting host findings to generate alerts? (Choose two.)A . Splunk B. Tenable C. JIRA D. QualysView AnswerAnswer: A,D
Which RQL query type is invalid?
Which RQL query type is invalid?A . Event B. IAM C. Incident D. ConfigView AnswerAnswer: B Explanation: RQL (Real-time Query Language) is a query language used to search, filter and analyze data in Prisma Cloud. The valid RQL query types are: ✑ Event: This type of query is used to...
Which RQL query type is invalid?
Which RQL query type is invalid?A . Event B. IAM C. Incident D. ConfigView AnswerAnswer: B Explanation: RQL (Real-time Query Language) is a query language used to search, filter and analyze data in Prisma Cloud. The valid RQL query types are: ✑ Event: This type of query is used to...