Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)
Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)A . HTTP B. SSH C. Tomcat Web Connector via AJP D. TLSView AnswerAnswer: A,D
Which twistcli command can be used to scan serverless functions?
A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?A . twistcli function scan <SERVERLESS_FUNCTION.ZIP> B. twistcli scan serverless <SERVERLESS_FUNCTION.ZIP> C. twistcli serverless AWS <SERVERLESS_FUNCTION.ZIP> D. twiscli serverless scan <SERVERLESS_FUNCTION.ZIP>View AnswerAnswer: D Explanation: The twistcli command...
While writing a custom RQL with array objects in the investigate page, which type of auto-suggestion a user can leverage?
While writing a custom RQL with array objects in the investigate page, which type of auto-suggestion a user can leverage?A . Auto-sugestion for array objects that are useful for comparing between arrays B. Auto-suggestion is not available for array objects C. Auto-suggestion for array objects that are useful for categorization...
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?A . Visibility, Compliance, Governance, and Threat Detection and Response B. Network, Anomaly, and Audit Event C. Visibility, Security, and Compliance D. Foundations, Advanced, and OptimizeView AnswerAnswer: A Explanation: The Adoption Advisor uses four categories...
Which three types of buckets exposure are available in the Data Security module? (Choose three.)
Which three types of buckets exposure are available in the Data Security module? (Choose three.)A . Public B. Private C. International D. Differential E. ConditionalView AnswerAnswer: ABE
The exclamation mark on the resource explorer page would represent?
The exclamation mark on the resource explorer page would represent?A . resource has been deleted B. the resource was modified recently C. resource has alerts D. resource has compliance violationView AnswerAnswer: C
Which three steps are involved in onboarding an account for Data Security? (Choose three.)
Which three steps are involved in onboarding an account for Data Security? (Choose three.)A . Create a read-only role with in-line policies B. Create a Cloudtrail with SNS Topic C. Enable Flow Logs D. Enter the RoleARN and SNSARN E. Create a S3 bucketView AnswerAnswer: B,D,E
What is the most reliable and extensive source for documentation on Prisma Cloud APIs?
What is the most reliable and extensive source for documentation on Prisma Cloud APIs?A . prisma.pan.dev B. docs.paloaltonetworks.com C. Prisma Cloud Administrator’s Guide D. Live CommunityView AnswerAnswer: A
Which policy type detects this behavior?
A customer wants to be notified about port scanning network activities in their environment. Which policy type detects this behavior?A . Network B. Port Scan C. Anomaly D. ConfigView AnswerAnswer: A
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed. How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . set the Container model to manual relearn and set the default runtime rule to block for process protection....