Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)

Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)A . Crypto miners B. Brute Force C. Cross-Site Scripting D. Port Scanning E. SQL InjectionView AnswerAnswer: B,D,A

March 27, 2023 No Comments READ MORE +

Which RQL query type is invalid?

Which RQL query type is invalid?A . Event B. IAM C. Incident D. ConfigView AnswerAnswer: C Explanation: RQL (Real-time Query Language) is a query language used to search, filter and analyze data in Prisma Cloud. The valid RQL query types are: ✑ Event: This type of query is used to...

March 27, 2023 No Comments READ MORE +

Which option shows the steps to install the Console in a Kubernetes Cluster?

Which option shows the steps to install the Console in a Kubernetes Cluster?A . Download the Console and Defender image Generate YAML for Defender Deploy Defender YAML using kubectl B. Download and extract release tarball Generate YAML for Console Deploy Console YAML using kubectl C. Download the Console and Defender...

March 27, 2023 No Comments READ MORE +

How often do Defenders share logs with Console?

How often do Defenders share logs with Console?A . Every 10 minutes B. Every 30 minutes C. Every 1 hour D. Real timeView AnswerAnswer: B

March 26, 2023 No Comments READ MORE +

Which order of steps map a policy to a custom compliance standard?

DRAG DROP Which order of steps map a policy to a custom compliance standard?(Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer:

March 26, 2023 No Comments READ MORE +

Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)

Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)A . Run the provided curl | bash script from Console to remove Defenders, and then use Cloud Discovery to automatically redeploy Defenders. B. Remove Defenders DaemonSet, and then use Cloud Discovery...

March 26, 2023 No Comments READ MORE +

How should the administrator configure Prisma Cloud Compute to satisfy this requirement?

A customer has a requirement to restrict any container from resolving the name www.evil-url.com. How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . Choose “copy into rule” for any Container, set www.evil-url.com as a blocklisted DNS name in the Container policy and set the policy effect...

March 26, 2023 No Comments READ MORE +

Where can Defender debug logs be viewed? (Choose two.)

Where can Defender debug logs be viewed? (Choose two.)A . /var/lib/twistlock/defender.log B. From the Console, Manage > Defenders > Manage > Defenders. Select the Defender from the deployed Defenders list, then click Actions > Logs C. From the Console, Manage > Defenders > Deploy > Defenders. Select the Defender from...

March 26, 2023 No Comments READ MORE +

Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)

Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)A . Install boto3 & requests library. B. Configure IAM Azure remediation script. C. Integrate with...

March 26, 2023 No Comments READ MORE +

What are the three states of the Container Runtime Model? (Choose three.)

What are the three states of the Container Runtime Model? (Choose three.)A . Initiating B. Learning C. Active D. Running E. ArchivedView AnswerAnswer: B C,E

March 26, 2023 No Comments READ MORE +