How should the administrator get a report of vulnerabilities on hosts?
A customer has Defenders connected to Prisma Cloud Enterprise. The Defenders are deployed as a DaemonSet in OpenShift. How should the administrator get a report of vulnerabilities on hosts?A . Navigate to Monitor > Vulnerabilities > CVE Viewer B. Navigate to Defend > Vulnerabilities > VM Images C. Navigate to...
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?A . Host B. Container C. Functions D. ImageView AnswerAnswer: D Explanation: Reference: https://docs.twistlock.com/docs/enterprise_edition/compliance/manage_compliance.html
Which option will satisfy this requirement in Prisma Cloud Compute?
An administrator has a requirement to ingest all Console and Defender logs to Splunk. Which option will satisfy this requirement in Prisma Cloud Compute?A . Enable the API settings for logging. B. Enable the CSV export in the Console. C. Enable the syslog option in the Console D. Enable the...
Which order of steps map a policy to a custom compliance standard?
DRAG DROP Which order of steps map a policy to a custom compliance standard?(Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer:
Which setting does the administrator enable or configure to accomplish this task?
An administrator for Prisma Cloud needs to obtain a graphical view to monitor all connections, including connections across hosts and connections to any configured network objects. Which setting does the administrator enable or configure to accomplish this task?A . ADEM B. WAAS Analytics C. Telemetry D. Cloud Native Network Firewall...
What type of query is necessary to complete this policy?
You are tasked with configuring a Prisma Cloud build policy for Terraform. What type of query is necessary to complete this policy?A . YAML B. JSON C. CloudFormation D. TerraformView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/create-a-policy/prisma-cloud-create-config-build-policy.html
Which command generates the YAML file for Defender install?
An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to YAML. Console Address: $CONSOLE_ADDRESS Websocket Address: $WEBSOCKET_ADDRESS User: $ADMIN_USER Which command generates the YAML file for Defender install?A . <PLATFORM>/twistcli defender --address...
Which order of steps map a policy to a custom compliance standard?
DRAG DROP Which order of steps map a policy to a custom compliance standard?(Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer:
What are the steps to deploy a single container Defender on an ec2 node?
An administrator has access to a Prisma Cloud Enterprise. What are the steps to deploy a single container Defender on an ec2 node?A . Pull the Defender image to the ec2 node, copy and execute the curl | bash script, and start the Defender to ensure it is running. B....
What is the behavior of Defenders when the Console is unreachable during upgrades?
What is the behavior of Defenders when the Console is unreachable during upgrades?A . Defenders continue to alert, but not enforce, using the policies and settings most recently cached before upgrading the Console. B. Defenders will fail closed until the web-socket can be re-established. C. Defenders will fail open until...