What is the order of steps to create a custom network policy?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?
Which two attributes are required for a custom config RQL? (Choose two.)
An administrator needs to detect and alert on any activities performed by a root account.
Which policy type should be used?