Which Prisma Cloud tab should you choose to complete this request?
The InfoSec team wants to be notified via email each time a Security Group is misconfigured. Which Prisma Cloud tab should you choose to complete this request?A . NotificationsB . PoliciesC . Alert RulesD . EventsView AnswerAnswer: C Explanation: In Prisma Cloud, to notify the InfoSec team via email about...
Which statement is true regarding CloudFormation templates?
Which statement is true regarding CloudFormation templates?A . Scan support does not currently exist for nested references, macros, or intrinsic functions.B . A single template or a zip archive of template files cannot be scanned with a single API request.C . Request-Header-Field ‘cloudformation-version’ is required to request a scan.D ....
Which order of steps map a policy to a custom compliance standard?
DRAG DROP Which order of steps map a policy to a custom compliance standard? (Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer: Explanation:
Which section of Console should the administrator use to review these findings?
A customer has multiple violations in the environment including: User namespace is enabled An LDAP server is enabled SSH root is enabled Which section of Console should the administrator use to review these findings?A . ManageB . VulnerabilitiesC . RadarD . ComplianceView AnswerAnswer: D Explanation: The correct section of the...
What is the behavior of Defenders when the Console is unreachable during upgrades?
What is the behavior of Defenders when the Console is unreachable during upgrades?A . Defenders continue to alert, but not enforce, using the policies and settings most recently cached before upgrading the Console.B . Defenders will fail closed until the web-socket can be re-established.C . Defenders will fail open until...
Why would this message appear as an audit?
An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type A”. Why would this message appear as an audit?A . The DNS was not learned as part of the Container model or added to the DNS...
Why are no alerts being generated?
You have onboarded a public cloud account into Prisma Cloud Enterprise. Configuration Resource ingestion is visible in the Asset Inventory for the onboarded account, but no alerts are being generated for the configuration assets in the account. Config policies are enabled in the Prisma Cloud Enterprise tenant, with those policies...
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?A . HostB . ContainerC . FunctionsD . ImageView AnswerAnswer: D Explanation: In the context of Defend > Compliance > Containers and Images > CI within Prisma Cloud by Palo Alto Networks,...
You wish to create a custom policy with build and run subtypes
DRAG DROP You wish to create a custom policy with build and run subtypes. Match the query types for each example. (Select your answer from the pull-down list. Answers may be used more than once or not at all.) View AnswerAnswer: Explanation: Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/create-a- policy.html
Which three types of buckets exposure are available in the Data Security module? (Choose three.)
Which three types of buckets exposure are available in the Data Security module? (Choose three.)A . PublicB . PrivateC . InternationalD . DifferentialE . ConditionalView AnswerAnswer: ABE Explanation: In the Data Security module of cloud security platforms like Prisma Cloud, the types of bucket exposures typically include Public (option A),...