Match the service on the right that evaluates each exposure type on the left. (Select your answer from the pull-down list. Answers may be used more than once or not at all

DRAG DROP Match the service on the right that evaluates each exposure type on the left. (Select your answer from the pull-down list. Answers may be used more than once or not at all.) View AnswerAnswer: Explanation: Reference: https://www.paloaltonetworks.com/prisma/cloud/cloud-data-security

September 23, 2024 No Comments READ MORE +

Which three types of classifications are available in the Data Security module? (Choose three.)

Which three types of classifications are available in the Data Security module? (Choose three.)A . Personally identifiable informationB . Malicious IPC . Compliance standardD . Financial informationE . MalwareView AnswerAnswer: ACD Explanation: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-data-security.html In the Data Security module of Prisma Cloud, the classifications available focus on the types of sensitive...

September 23, 2024 No Comments READ MORE +

How should the administrator configure Prisma Cloud Compute to satisfy this requirement?

A customer has a requirement to restrict any container from resolving the name www.evil-url.com. How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . Choose “copy into rule” for any Container, set www.evil-url.com as a blocklisted DNS name in the Container policy and set the policy effect...

September 23, 2024 No Comments READ MORE +

What are the two ways to scope a CI policy for image scanning? (Choose two.)

What are the two ways to scope a CI policy for image scanning? (Choose two.)A . container nameB . image nameC . hostnameD . image labelsView AnswerAnswer: B, D Explanation: Reference: https://www.optiv.com/insights/source-zero/blog/defending-against-container-threats-palo-alto-prisma-cloud In Prisma Cloud, CI policies for image scanning can be scoped based on the image name and image...

September 23, 2024 No Comments READ MORE +

Which API calls can scan an image named myimage: latest with twistcli and then retrieve the results from Console?

Which API calls can scan an image named myimage: latest with twistcli and then retrieve the results from Console?A . $ twistcli images scan --address <COMPUTE_CONSOLE> --user <COMPUTER_CONSOLE_USER> --password <COMPUTER_CONSOLE_PASSWD> --verbose myimage: latestB . $ twistcli images scan --address <COMPUTE_CONSOLE> --user <COMPUTER_CONSOLE_USER> ...

September 22, 2024 No Comments READ MORE +

How should the administrator configure Prisma Cloud Compute to satisfy this requirement?

A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed. How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . set the Container model to manual relearn and set the default runtime rule to block for process protection.B...

September 22, 2024 No Comments READ MORE +

Which port should a security team use to pull data from Console’s API?

Which port should a security team use to pull data from Console’s API?A . 53B . 25C . 8084D . 8083View AnswerAnswer: C Explanation: Port 8084 is commonly used for accessing the Console's API in Prisma Cloud. This port allows security teams to programmatically interact with the Prisma Cloud Console,...

September 22, 2024 No Comments READ MORE +

Which options show the steps required after upgrade of Console?

Which options show the steps required after upgrade of Console?A . Uninstall Defenders Upgrade Jenkins Plugin Upgrade twistcli where applicable Allow the Console to redeploy the DefenderB . Update the Console image in the Twistlock hosted registry Update the Defender image in the Twistlock hosted registry Uninstall DefendersC . Upgrade...

September 22, 2024 No Comments READ MORE +

How should the administrator configure Prisma Cloud Compute to satisfy this requirement?

A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed. How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . set the Container model to manual relearn and set the default runtime rule to block for process protection.B...

September 22, 2024 No Comments READ MORE +

Prisma Cloud Compute Compliance enforcement for hosts covers which three options?

A customer wants to harden its environment from misconfiguration. Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)A . Docker daemon configuration filesB . Docker daemon configurationC . Host cloud provider tagsD . Host configurationE . Hosts without Defender agentsView AnswerAnswer: ABD Explanation: Prisma Cloud Compute...

September 22, 2024 No Comments READ MORE +