An administrator has deployed an AWS transit gateway and used multiple VPC spokes to segregate a multi-tier application. The administrator also created a security VPC with multiple VM-Series NGFWs in an active/active deployment model via ECMP using Amazon Web Services VPN-based attachments.
What must be configured on the firewall to avoid asymmetric routing?
Which two resource types are included in the Prisma Cloud Enterprise licensing count? (Choose two.)
Which pillar of the Prisma Cloud platform provides support for both public and private clouds as well as flexible agentless scanning and agent-based protection?
All Amazon Regional Database Service (RDS)-deployed resources and the regions in which they are deployed can be identified by prisma Cloud using which two methods? (Choose two.)
Which statement explains the correlation between the block and alert thresholds in a vulnerability management policy?
An image containing medium vulnerabilities that do not have available fixes is being deployed into the sock-shop namespace. Prisma Cloud has been configured for vulnerability management within the organization's continuous integration (CI) tool and registry.
What will occur during the attempt to deploy this image from the CI tool into the sock-shop namespace?
Which configuration needs to be done to perform user entity behavior analysis with Prisma Public Cloud?
Which statement applies to optimization of registry scans with version pattern matching?
Which three features are not supported by VM-Series NGFWs on Azure Stack? (Choose three.)
Which type of Resource Query Language (RQL) query is used to create a custom policy that looks for untagged resources?
Which option is true about VM-Series NGFW templates available from the Palo Alto Networks GitHub repository?
Which RQL string searches for all EBS volumes that do not have a "DataClassification" tag?
Prisma Public Cloud enables compliance monitoring and reporting by mapping which configurations to compliance standards?
Which two deployment methods are supported for Prisma Cloud Compute (PCC) container Defenders? (Choose two.)
How does Prisma Cloud Enterprise autoremediate unwanted violations to public cloud infrastructure?
Prevention against which type of attack is configurable in Web-Application and API Security (WAAS)?
Which two actions are appropriate when configuring Prisma Cloud to scan a registry? (Choose two.)
In which two ways can Prisma Cloud Compute (PCC) edition be installed? (Choose two.)
The Microsoft Azure virtual network gateway supports which two site-to-site connectivity options? (Choose two.)
Which Resource Query Language (RQL) query returns a list of all Azure SQL Databases that have transparent data encryption turned in?
What are two examples of Amazon Web Services logging services? (Choose two.)
The VM-Series integration with Amazon GuardDuty feeds malicious IP addresses to the VM-Series NGFW using XML API to populate a Dynamic Address Group within a Security policy that blocks traffic.
How does Amazon Web Services achieve this integration?
Which three services can Google Cloud Security Scanner assess? (Choose three.)
Which two elements does Prisma Cloud monitor when analyzing for unusual user activity? (Choose two.)