You wish to create a custom policy with build and run subtypes
DRAG DROP You wish to create a custom policy with build and run subtypes. Match the query types for each example. (Select your answer from the pull-down list. Answers may be used more than once or not at all.) View AnswerAnswer:
tenant-In which order will the APIs be executed for this service?
DRAG DROP An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise. tenant-In which order will the APIs be executed for this service? (Drag the steps into the correct order of occurrence from the first step to the...
Which authentication mechanism is supported by Prisma Cloud?
Which authentication mechanism is supported by Prisma Cloud?A . Certificate-based authentication for the Console Ul and the APIB . Certificate-based authentication only for the APIC . Certificate-based authentication only for the Console UlD . SAML-based authentication for the APIView AnswerAnswer: A
Which page in the Console should the administrator use to review this data, if it can be reviewed at all?
The administrator wants to review the Console audit logs from within the Console. Which page in the Console should the administrator use to review this data, if it can be reviewed at all?A . The audit logs can be viewed only externally to the ConsoleB . Navigate to Monitor >...
You wish to create a custom policy with build and run subtypes
DRAG DROP You wish to create a custom policy with build and run subtypes. Match the query types for each example. (Select your answer from the pull-down list. Answers may be used more than once or not at all.) View AnswerAnswer:
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . add a new runtime policy targeted at a specific Container name, add ransomWare process into the denied process...
The security team wants to target a CMAF policy for specific running Containers How should the administrator scope the policy to target the Containers?
The security team wants to target a CMAF policy for specific running Containers How should the administrator scope the policy to target the Containers?A . scope the policy to Image namesB . scope the policy to namespacesC . scope the policy to Defender names.D . scope the policy to Host...
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?A . Download and extract the release tarball Ensure that each node has it own storage for Console data Create the Console task definition Deploy the task definitionB . Download and extract release...
Which two statements are true about the differences between build and run config policies? (Choose two.)
Which two statements are true about the differences between build and run config policies? (Choose two.)A . Build and Audit Events policies belong to the configuration policy setB . Run policies monitor resources, and check for potential issues after these cloud resources are deployedC . Run policies monitor network activities...
What is the order of steps to create a custom network policy?
DRAG DROP What is the order of steps to create a custom network policy? (Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer: