Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?A . SAMLB . access keyC . basic authenticationD . single sign-onView AnswerAnswer: B Explanation: Prisma Cloud requires an API access key to enable programmatic access to the REST API. By default, only the System Admin has API access...
Which command generates the YAML file for Defender install?
An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to YAML Console Address SCONSOLE_ADDRESS Websocket Address SWEBSOCKHT_ADDRESS User: SADMIN USER Which command generates the YAML file for Defender install? A) B) C) D)...
Which option shows the steps to install the Console in a Kubernetes Cluster?
Which option shows the steps to install the Console in a Kubernetes Cluster?A . Download the Console and Defender image Download YAML for Defender from the document site Deploy Defender YAML using kubectlB . Download and extract release tarball Generate YAML for Console Deploy Console YAML using kubectlC . Download...
Which twistcli command can be used to scan serverless functions?
A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?A . twistcli serverless AWS <SERVERLESS_FUNCTION ZIP>B . twistcli serverless scan <SERVERLESS_FUNCTIOC . ZIP>D . twistcli scan serverless <SERVERLESS_FUNCTION Z1P>E . twistcli function scan <SERVERLESS_FUNCT10N ZIP>View AnswerAnswer:...
Retrieve the Prisma Cloud Console images using 'docker pull' To retrieve Prisma Cloud Console images using basic auth
Retrieve the Prisma Cloud Console images using 'docker pull' To retrieve Prisma Cloud Console images using basic auth D. 1 Access registry paloaltonetworks com. and authenticate using 'docker login' 2 Retrieve the Prisma Cloud Console images using 'docker pull'View AnswerAnswer: C
Which three steps are involved in onboarding an account for Data Security? (Choose three.)
Which three steps are involved in onboarding an account for Data Security? (Choose three.)A . Enter the RoleARN and SNSARNB . Enable Flow LogsC . Create a S3 bucketD . Create a Cloudtrail with SNS TopicE . Create a read-only role with in-line policiesView AnswerAnswer: A,B,E
What are three options for configuring vulnerability policies?
A security team has a requirement to ensure the environment is scanned for vulnerabilities . What are three options for configuring vulnerability policies? (Choose three.)A . customize message on blocked requestsB . individual actions based on package typeC . output verbosity for blocked requestsD . apply policy only when vendor...
Which three options could have generated this audit?
A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)A . The mined currency is associated with a user token.B . The value of the mined currency exceeds $100.C . High CPU usage over time for...
Which policy type has the built-in CLI command for remediation?
A customer wants to turn on Auto Remediation. Which policy type has the built-in CLI command for remediation?A . NetworkB . AnomalyC . ConfigD . Audit EventView AnswerAnswer: C
You wish to create a custom policy with build and run subtypes
DRAG DROP You wish to create a custom policy with build and run subtypes. Match the query types for each example. (Select your answer from the pull-down list. Answers may be used more than once or not at all.) View AnswerAnswer: