Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)A . Network flow B. Audit C. Traffic D. UsersView AnswerAnswer: A,B
Which two integrations enable ingesting host findings to generate alerts? (Choose two.)
Which two integrations enable ingesting host findings to generate alerts? (Choose two.)A . Splunk B. Tenable C. JIRA D. QualysView AnswerAnswer: A,D
The attempted bytes count displays?
The attempted bytes count displays?A . traffic that is either denied by the security group or firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet. B. traffic that is either denied by the security group or...
Which order of steps map a policy to a custom compliance standard?
DRAG DROP Which order of steps map a policy to a custom compliance standard?(Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer:
Which two required request headers interface with Prisma Cloud API? (Choose two.)
Which two required request headers interface with Prisma Cloud API? (Choose two.)A . Content-type:application/json B. x-redlock-auth C. >x-redlock-request-id D. Content-type:application/xmlView AnswerAnswer: A,B Explanation: Reference: https://prisma.pan.dev/api/cloud/api-headers/
How should the development team configure the pipeline or policy to produce this outcome?
The development team wants to fail CI jobs where a specific CVE is contained within the image. How should the development team configure the pipeline or policy to produce this outcome?A . Set the specific CVE exception as an option in Jenkins or twistcli. B. Set the specific CVE exception...
Which order of steps map a policy to a custom compliance standard?
DRAG DROP Which order of steps map a policy to a custom compliance standard?(Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer:
In which order will the APIs be executed for this service?
DRAG DROP An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant. In which order will the APIs be executed for this service?(Drag the steps into the correct order of occurrence, from the first step to the...
What effect will this option have if it violates the compliance check?
The security team wants to enable the “block” option under compliance checks on the host. What effect will this option have if it violates the compliance check?A . The host will be taken offline. B. Additional hosts will be prevented form starting. C. Containers on a host will be stopped....
Which order of steps map a policy to a custom compliance standard?
DRAG DROP Which order of steps map a policy to a custom compliance standard?(Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer: