Which order of steps map a policy to a custom compliance standard?

DRAG DROP Which order of steps map a policy to a custom compliance standard? (Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer: Explanation:

September 21, 2024 No Comments READ MORE +

Which command generates the YAML file for Defender install?

An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to YAML. Console Address: $CONSOLE_ADDRESS Websocket Address: $WEBSOCKET_ADDRESS User: $ADMIN_USER Which command generates the YAML file for Defender install?A . <PLATFORM>/twistcli defender --address...

September 21, 2024 No Comments READ MORE +

In which order will the APIs be executed for this service?

DRAG DROP An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant. In which order will the APIs be executed for this service? (Drag the steps into the correct order of occurrence, from the first step to...

September 21, 2024 No Comments READ MORE +

How should the customer automate vulnerability scanning for images deployed to Fargate?

A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying. How should the customer automate vulnerability scanning for images deployed to Fargate?A . Set up a vulnerability scanner on the registryB . Embed a Fargate Defender to automatically scan...

September 21, 2024 No Comments READ MORE +

Where should the customer navigate in Console?

Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default. Where should the customer navigate in Console?A . Monitor > ComplianceB . Defend > ComplianceC . Manage > ComplianceD . Custom > ComplianceView AnswerAnswer: B Explanation: Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/compliance/manage_compliance.html In the...

September 21, 2024 No Comments READ MORE +

Which “kind” of Kubernetes object is configured to ensure that Defender is acting as the admission controller?

Which “kind” of Kubernetes object is configured to ensure that Defender is acting as the admission controller?A . MutatingWebhookConfigurationB . DestinationRulesC . ValidatingWebhookConfigurationD . PodSecurityPoliciesView AnswerAnswer: C Explanation: In the context of Kubernetes, an admission controller is a piece of code that intercepts requests to the Kubernetes API server before...

September 20, 2024 No Comments READ MORE +

Where can the administrator locate this list of e-mail recipients?

Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts. Where can the administrator locate this list of e-mail recipients?A . Target section within an Alert Rule.B . Notification Template section within Alerts.C . Users section within Settings.D . Set...

September 20, 2024 No Comments READ MORE +

Order the steps involved in onboarding an AWS Account for use with Data Security feature

DRAG DROP Order the steps involved in onboarding an AWS Account for use with Data Security feature. View AnswerAnswer: Explanation: Create CloudTrail with S3 as storage Enter SNS Topic in CloudTrail Enter RoleARN and SNSARN Create Stack Comprehensive Detailed Onboarding an AWS account for use with the Data Security feature...

September 19, 2024 No Comments READ MORE +

Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?

Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?A . HighB . MediumC . LowD . Very HighView AnswerAnswer: B Explanation: In the context of setting anomaly alert intensities in Prisma Cloud, an intensity setting of "Medium" could be used for the...

September 19, 2024 No Comments READ MORE +

Which three options could have generated this audit?

A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)A . The value of the mined currency exceeds $100.B . High CPU usage over time for the container is detected.C . Common cryptominer process name was...

September 19, 2024 No Comments READ MORE +