The Compute Console has recently been upgraded, and the administrator plans to delay upgrading the Defenders and the Twistcli tool until some of the team’s resources have been rescaled. The Console is currently one major release ahead.
What will happen as a result of the Console upgrade?
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?
Which two processes ensure that builds can function after a Console upgrade? (Choose two.)
What are two ways to scan container images in Jenkins pipelines? (Choose two.)
While writing a custom RQL with array objects in the investigate page, which type of auto-suggestion a user can leverage?
Which ban for DoS protection will enforce a rate limit for users who are unable to post five (5) “. tar.gz" files within five (5) seconds?
Where can a user submit an external new feature request?
What is a benefit of the Cloud Discovery feature?
What is the order of steps to create a custom network policy?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
What is the behavior of Defenders when the Console is unreachable during upgrades?
A customer does not want alerts to be generated from network traffic that originates from trusted internal networks.
Which setting should you use to meet this customer’s request?
Where can Defender debug logs be viewed? (Choose two.)
A customer has a development environment with 50 connected Defenders. A maintenance window is set for Monday to upgrade 30 stand-alone Defenders in the development environment, but there is no maintenance window available until Sunday to upgrade the remaining 20 stand-alone Defenders.
Which recommended action manages this situation?
Which resources can be added in scope while creating a vulnerability policy for continuous integration?
Which two filters are available in the SecOps dashboard? (Choose two.)
Which three Orchestrator types are supported when deploying Defender? (Choose three.)
Move the steps to the correct order to set up and execute a serverless scan using AWS DevOps.
A customer wants to turn on Auto Remediation.
Which policy type has the built-in CLI command for remediation?
How often do Defenders share logs with Console?
A security team has a requirement to ensure the environment is scanned for vulnerabilities. What are three options for configuring vulnerability policies? (Choose three.)
When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
Taking which action will automatically enable all severity levels?
How is the scope of each rule determined in the Prisma Cloud Compute host runtime policy?
The security team wants to enable the “block” option under compliance checks on the host.
What effect will this option have if it violates the compliance check?
Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)
Which action must be taken to enable a user to interact programmatically with the Prisma Cloud APIs and for a nonhuman entity to be enabled for the access keys?
The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely.
Which strategy should the administrator use to achieve this goal?
A customer wants to be notified about port scanning network activities in their environment. Which policy type detects this behavior?
A user from an organization is unable to log in to Prisma Cloud Console after having logged in the previous day.
Which area on the Console will provide input on this issue?
What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?
Given the following information, which twistcli command should be run if an administrator were to exec into a running container and scan it from within using an access token for authentication?
• Console is located at
• Token is: TOKEN_VALUE
• Report ID is: REPORTJD
• Container image running is: myimage:latest
A customer has serverless functions that are deployed in multiple clouds.
Which serverless cloud provider is covered be “overly permissive service access” compliance check?
Which two required request headers interface with Prisma Cloud API? (Choose two.)
Which three platforms support the twistcli tool? (Choose three.)
Which two attributes of policies can be fetched using API? (Choose two.)
You have onboarded a public cloud account into Prisma Cloud Enterprise. Configuration Resource ingestion is visible in the Asset Inventory for the onboarded account, but no alerts are being generated for the configuration assets in the account.
Config policies are enabled in the Prisma Cloud Enterprise tenant, with those policies associated to existing alert rules. ROL statements on the investigate matching those policies return config resource results successfully.
Why are no alerts being generated?
Which RQL query type is invalid?
Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).
What happens when a role is deleted in Prisma Cloud?
A security team has been asked to create a custom policy.
Which two methods can the team use to accomplish this goal? (Choose two.)
Which three actions are required in order to use the automated method within Azure Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose three.)
Which component(s), if any, will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?
One of the resources on the network has triggered an alert for a Default Config policy.
Given the following resource JSON snippet:
Which RQL detected the vulnerability?
A)
B)
C)
D)
Which two variables must be modified to achieve automatic remediation for identity and access management (IAM) alerts in Azure cloud? (Choose two.)
An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant.
In which order will the APIs be executed for this service?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
The development team wants to block Cross Site Scripting attacks from pods in its environment. How should the team construct the CNAF policy to protect against this attack?
In which Console menu would an administrator verify whether a custom compliance check is failing or passing?
The attempted bytes count displays?
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
How does assigning an account group to an administrative user on Prisma Cloud help restrict access to resources?
A customer is interested in PCI requirements and needs to ensure that no privilege containers can start in the environment.
Which action needs to be set for “do not use privileged containers”?
Put the steps of integrating Okta with Prisma Cloud in the right order in relation to CIEM or SSO okra integration.
An administrator has added a Cloud account on Prisma Cloud and then deleted it.
What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?
What is the default namespace created by Defender DaemonSet during deployment?
Where are Top Critical CVEs for deployed images found?
A manager informs the SOC that one or more RDS instances have been compromised and the SOC needs to make sure production RDS instances are NOT publicly accessible.
Which action should the SOC take to follow security best practices?
If you are required to run in an air-gapped environment, which product should you install?
What are the three states of the Container Runtime Model? (Choose three.)
Which of the following is a reason for alert dismissal?
A customer has a requirement to scan serverless functions for vulnerabilities.
What is the correct option to configure scanning?
Put the steps involved to configure and scan using the IntelliJ plugin in the correct order.
Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
What are two key requirements for integrating Okta with Prisma Cloud when multiple Amazon Web Services (AWS) cloud accounts are being used? (Choose two.)
An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type A”.
Why would this message appear as an audit?
Which container scan is constructed correctly?
Which option identifies the Prisma Cloud Compute Edition?
Which RQL will trigger the following audit event activity?
Which ROL query is used to detect certain high-risk activities executed by a root user in AWS?
Console is running in a Kubernetes cluster, and Defenders need to be deployed on nodes within this cluster.
How should the Defenders in Kubernetes be deployed using the default Console service name?
Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?
You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant’s existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.
Which option shows the steps required during the alert rule creation process to achieve this objective?
A customer has a requirement to automatically protect all Lambda functions with runtime protection. What is the process to automatically protect all the Lambda functions?
On which cloud service providers can new API release information for Prisma Cloud be received?
Which data security default policy is able to scan for vulnerabilities?