Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)

Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)A . Network flow B. Audit C. Traffic D. UsersView AnswerAnswer: A,B

April 2, 2023 No Comments READ MORE +

Which two integrations enable ingesting host findings to generate alerts? (Choose two.)

Which two integrations enable ingesting host findings to generate alerts? (Choose two.)A . Splunk B. Tenable C. JIRA D. QualysView AnswerAnswer: A,D

April 2, 2023 No Comments READ MORE +

The attempted bytes count displays?

The attempted bytes count displays?A . traffic that is either denied by the security group or firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet. B. traffic that is either denied by the security group or...

April 2, 2023 No Comments READ MORE +

Which order of steps map a policy to a custom compliance standard?

DRAG DROP Which order of steps map a policy to a custom compliance standard?(Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer:

April 1, 2023 No Comments READ MORE +

Which two required request headers interface with Prisma Cloud API? (Choose two.)

Which two required request headers interface with Prisma Cloud API? (Choose two.)A . Content-type:application/json B. x-redlock-auth C. >x-redlock-request-id D. Content-type:application/xmlView AnswerAnswer: A,B Explanation: Reference: https://prisma.pan.dev/api/cloud/api-headers/

April 1, 2023 No Comments READ MORE +

How should the development team configure the pipeline or policy to produce this outcome?

The development team wants to fail CI jobs where a specific CVE is contained within the image. How should the development team configure the pipeline or policy to produce this outcome?A . Set the specific CVE exception as an option in Jenkins or twistcli. B. Set the specific CVE exception...

April 1, 2023 No Comments READ MORE +

Which order of steps map a policy to a custom compliance standard?

DRAG DROP Which order of steps map a policy to a custom compliance standard?(Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer:

April 1, 2023 No Comments READ MORE +

In which order will the APIs be executed for this service?

DRAG DROP An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant. In which order will the APIs be executed for this service?(Drag the steps into the correct order of occurrence, from the first step to the...

April 1, 2023 No Comments READ MORE +

What effect will this option have if it violates the compliance check?

The security team wants to enable the “block” option under compliance checks on the host. What effect will this option have if it violates the compliance check?A . The host will be taken offline. B. Additional hosts will be prevented form starting. C. Containers on a host will be stopped....

April 1, 2023 No Comments READ MORE +

Which order of steps map a policy to a custom compliance standard?

DRAG DROP Which order of steps map a policy to a custom compliance standard?(Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer:

March 31, 2023 No Comments READ MORE +