Which strategy should the administrator use to achieve this goal?
The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely. Which strategy should the administrator use to achieve this goal?A . Disable the policy B....
What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?
What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?A . It is a unique identifier needed only when Monitor & Protect mode is selected. B. It is the resource name for the Prisma Cloud Role. C. It is a...
Which page in the Console should the administrator use to review this data, if it can be reviewed at all?
The administrator wants to review the Console audit logs from within the Console. Which page in the Console should the administrator use to review this data, if it can be reviewed at all?A . Navigate to Monitor > Events > Host Log Inspection B. The audit logs can be viewed...
Which options show the steps required to upgrade Console when using projects?
Which options show the steps required to upgrade Console when using projects?A . Upgrade all Supervisor Consoles Upgrade Central Console B. Upgrade Central Console Upgrade Central Console Defenders C. Upgrade Defender Upgrade Central Console Upgrade Supervisor Consoles D. Upgrade Central Console Upgrade all Supervisor ConsolesView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-09/prisma-cloud-compute-edition-admin/upgrade/upgrade_process.html
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?A . The console cannot natively run in an ECS cluster. A onebox deployment should be used. B. Download and extract the release tarball Ensure that each node has its own storage for...
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)A . DoS Protection B. Local file inclusion C. SQL injection D. Suspicious binary E. ShellshockView AnswerAnswer: BCE
Move the steps to the correct order to set up and execute a serverless scan using AWS DevOps
DRAG DROP Move the steps to the correct order to set up and execute a serverless scan using AWS DevOps. View AnswerAnswer: Explanation: Graphical user interface, text, application Description automatically generated
In which order will the APIs be executed for this service?
DRAG DROP An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant. In which order will the APIs be executed for this service?(Drag the steps into the correct order of occurrence, from the first step to the...
In which order should the API calls be used to accomplish this task?
DRAG DROP An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days. In which order should the API calls be used to accomplish this task? (Drag the steps into the correct order from the first step to the last.) Select...
Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?
A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company’s AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded...