Which resource and policy type are used to calculate AWS Net Effective Permissions? (Choose two.)
Console is running in a Kubernetes cluster, and Defenders need to be deployed on nodes within this cluster.
How should the Defenders in Kubernetes be deployed using the default Console service name?
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)
The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely.
Which strategy should the administrator use to achieve this goal?
Which API calls can scan an image named myimage: latest with twistcli and then retrieve the results from Console?
A customer has a development environment with 50 connected Defenders. A maintenance window is set for Monday to upgrade 30 stand-alone Defenders in the development environment, but there is no maintenance window available until Sunday to upgrade the remaining 20 stand-alone Defenders.
Which recommended action manages this situation?
Which two statements explain differences between build and run config policies? (Choose two.)
Which two of the following are required to be entered on the IdP side when setting up SSO in Prisma Cloud? (Choose two.)
Given the following RQL:
event from cloud.audit_logs where operation IN (‘CreateCryptoKey’, ‘DestroyCryptoKeyVersion’, ‘v1.compute.disks.createSnapshot’)
Which audit event snippet is identified?
A)
B)
C)
D)
Move the steps to the correct order to set up and execute a serverless scan using AWS DevOps.
When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?
An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.
What does the administrator need to configure?
Which IAM Azure RQL query would correctly generate an output to view users who have sufficient permissions to create security groups within Azure AD and create applications?
A security team has a requirement to ensure the environment is scanned for vulnerabilities. What are three options for configuring vulnerability policies? (Choose three.)
Which two statements apply to the Defender type Container Defender - Linux?
How does assigning an account group to an administrative user on Prisma Cloud help restrict access to resources?
A customer has multiple violations in the environment including:
User namespace is enabled
An LDAP server is enabled
SSH root is enabled
Which section of Console should the administrator use to review these findings?
If you are required to run in an air-gapped environment, which product should you install?
Which three steps are involved in onboarding an account for Data Security? (Choose three.)
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
A customer has Prisma Cloud Enterprise and host Defenders deployed.
What are two options that allow an administrator to upgrade Defenders? (Choose two.)
The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.
Which type of policy should be created to protect this pod from Layer7 attacks?
Which command should be used in the Prisma Cloud twistcli tool to scan the nginx:latest image for vulnerabilities and compliance issues?
A)
B)
C)
D)
Given this information:
The Console is located at https://prisma-console.mydomain.local The username is: cluster
The password is: password123
The image to scan is: myimage:latest
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
Which two roles have access to view the Prisma Cloud policies? (Choose two.)
A Prisma Cloud administrator is tasked with pulling a report via API. The Prisma Cloud tenant is located on app2.prismacloud.io.
What is the correct API endpoint?
On which cloud service providers can you receive new API release information for Prisma Cloud?
Creation of a new custom compliance standard that is based on other individual custom compliance standards needs to be automated.
Assuming the necessary data from other standards has been collected, which API order should be used for this new compliance standard?
Which two information types cannot be seen in the data security dashboard? (Choose two).
Order the steps involved in onboarding an AWS Account for use with Data Security feature.
You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant’s existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.
Which option shows the steps required during the alert rule creation process to achieve this objective?
What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?
What is the most reliable and extensive source for documentation on Prisma Cloud APIs?
In which two ways can Prisma Cloud images be retrieved in Prisma Cloud Compute Self-Hosted Edition? (Choose two.)
Which serverless cloud provider is covered by the "overly permissive service access" compliance check?
A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company’s AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded individually.
The business unit has decided to cover the scope of this action and determined that a script should be written to onboard each of these accounts with general settings to gain immediate posture visibility across the accounts.
Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?
A customer does not want alerts to be generated from network traffic that originates from trusted internal networks.
Which setting should you use to meet this customer’s request?
Given the following RQL:
Which audit event snippet is identified by the RQL?
A)
B)
C)
D)
A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?
An administrator wants to retrieve the compliance policies for images scanned in a continuous integration (CI) pipeline.
Which endpoint will successfully execute to enable access to the images via API?
Which Prisma Cloud policy type detects port scanning activities in a customer environment?
A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
A customer wants to monitor the company’s AWS accounts via Prisma Cloud, but only needs the resource configuration to be monitored for now.
Which two pieces of information do you need to onboard this account? (Choose two.)
A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
A customer has Defenders connected to Prisma Cloud Enterprise. The Defenders are deployed as a DaemonSet in OpenShift.
How should the administrator get a report of vulnerabilities on hosts?
Which of the following are correct statements regarding the use of access keys? (Choose two.)
Which two frequency options are available to create a compliance report within the console? (Choose two.)
Which three types of classifications are available in the Data Security module? (Choose three.)
Which two fields are required to configure SSO in Prisma Cloud? (Choose two.)
What improves product operationalization by adding visibility into feature utilization and missed opportunities?
Which file extension type is supported for Malware scanning in Prisma Cloud Data Security (PCDS)?
Which three actions are required in order to use the automated method within Azure Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose three.)
Which three actions are available for the container image scanning compliance rule? (Choose three.)
What is the order of steps to create a custom network policy?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Which of the below actions would indicate – “The timestamp on the compliance dashboard?
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?
The administrator wants to review the Console audit logs from within the Console.
Which page in the Console should the administrator use to review this data, if it can be reviewed at all?
Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts.
Where can the administrator locate this list of e-mail recipients?