What is the order of steps in a Jenkins pipeline scan?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days.
In which order should the API calls be used to accomplish this task? (Drag the steps into the correct order from the first step to the last.) Select and Place:
Based on the following information, which RQL query will satisfy the requirement to identify VM hosts deployed to organization public cloud environments exposed to network traffic from the internet and affected by Text4Shell RCE (CVE-2022-42889) vulnerability?
• Network flow logs from all virtual private cloud (VPC) subnets are ingested to the Prisma Cloud Enterprise Edition tenant.
• All virtual machines (VMs) have Prisma Cloud Defender deployed.
A)
B)
C)
D)
A Prisma Cloud Administrator onboarded an AWS cloud account with agentless scanning enabled successfully to Prisma Cloud. Which item requires deploying defenders to be able to inspect the risk on the onboarded AWS account?
A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?
Which two information types cannot be seen in the data security dashboard? (Choose two).
Which Defender type performs registry scanning?
A customer has a requirement to scan serverless functions for vulnerabilities.
Which three settings are required to configure serverless scanning? (Choose three.)
Which two options may be used to upgrade the Defenders with a Console v20.04 and Kubernetes deployment? (Choose two.)
Which option identifies the Prisma Cloud Compute Edition?
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
Where can Defender debug logs be viewed? (Choose two.)
Which two CI/CD plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.).
An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query programmatically the existing users, and the user’s associated permission levels, in a Prisma Cloud Enterprise tenant.
Which public documentation location should be reviewed to help determine the required attributes to carry out this step?
An administrator wants to enforce a rate limit for users not being able to post five (5) .tar.gz files within five (5) seconds.
What does the administrator need to configure?
Which two integrations enable ingesting host findings to generate alerts? (Choose two.)
Which two integrated development environment (IDE) plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
A Prisma Cloud administrator is tasked with pulling a report via API. The Prisma Cloud tenant is located on app2.prismacloud.io.
What is the correct API endpoint?
A customer wants to be notified about port scanning network activities in their environment. Which policy type detects this behavior?
Which of the following is displayed in the asset inventory?
What are two built-in RBAC permission groups for Prisma Cloud? (Choose two.)
What factor is not used in calculating the net effective permissions for a resource in AWS?
What happens when a role is deleted in Prisma Cloud?
A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)
Which set of steps is the correct process for obtaining Console images for Prisma Cloud Compute Edition?
Which report includes an executive summary and a list of policy violations, including a page with details for each policy?
Which step is included when configuring Kubernetes to use Prisma Cloud Compute as an admission controller?
Which order of steps map a policy to a custom compliance standard?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
On which cloud service providers can new API release information for Prisma Cloud be received?
A customer has a development environment with 50 connected Defenders. A maintenance window is set for Monday to upgrade 30 stand-alone Defenders in the development environment, but there is no maintenance window available until Sunday to upgrade the remaining 20 stand-alone Defenders.
Which recommended action manages this situation?
Which role does Prisma Cloud play when configuring SSO?
Which statement applies to Adoption Advisor?
Under which tactic is “Exploit Public-Facing Application” categorized in the ATT&CK framework?
An administrator needs to detect and alert on any activities performed by a root account.
Which policy type should be used?
An administrator has a requirement to ingest all Console and Defender logs to Splunk.
Which option will satisfy this requirement in Prisma Cloud Compute?
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
Which statement accurately characterizes SSO Integration on Prisma Cloud?
Which component(s), if any, will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?
Which field is required during the creation of a custom config query?
Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)
Which options show the steps required to upgrade Console when using projects?
A customer wants to harden its environment from misconfiguration.
Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)
On which cloud service providers can you receive new API release information for Prisma Cloud?
Which policy type in Prisma Cloud can protect against malware?
Which options show the steps required after upgrade of Console?
What are the subtypes of configuration policies in Prisma Cloud?
What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?
Which two frequency options are available to create a compliance report within the console? (Choose two.)
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
Console is running in a Kubernetes cluster, and Defenders need to be deployed on nodes within this cluster.
How should the Defenders in Kubernetes be deployed using the default Console service name?
An administrator has access to a Prisma Cloud Enterprise.
What are the steps to deploy a single container Defender on an ec2 node?
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
Prisma Cloud supports sending audit event records to which three targets? (Choose three.)
The security team wants to enable the “block” option under compliance checks on the host.
What effect will this option have if it violates the compliance check?
An administrator sees that a runtime audit has been generated for a container.
The audit message is:
“/bin/ls launched and is explicitly blocked in the runtime rule. Full command: ls -latr”
Which protection in the runtime rule would cause this audit?
The compliance team needs to associate Prisma Cloud policies with compliance frameworks. Which option should the team select to perform this task?
Which option shows the steps to install the Console in a Kubernetes Cluster?
Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.
Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?
Which two fields are required to configure SSO in Prisma Cloud? (Choose two.)
What is a benefit of the Cloud Discovery feature?
Which alerts are fixed by enablement of automated remediation?
Which three actions are available for the container image scanning compliance rule? (Choose three.)
What are the three states of the Container Runtime Model? (Choose three.)
In Azure, what permissions need to be added to Management Groups to allow Prisma Cloud to calculate net effective permissions?
You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant’s existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.
Which option shows the steps required during the alert rule creation process to achieve this objective?
Which ban for DoS protection will enforce a rate limit for users who are unable to post five (5) “. tar.gz" files within five (5) seconds?
A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
Which statement is true regarding CloudFormation templates?
Which two of the following are required to be entered on the IdP side when setting up SSO in Prisma Cloud? (Choose two.)
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?
Which of the following is a reason for alert dismissal?
A customer's Security Operations Center (SOC) team wants to receive alerts from Prisma Cloud via email once a day about all policies that have a violation, rather than receiving an alert every time a new violation occurs.
Which alert rule configuration meets this requirement?
Which port should a security team use to pull data from Console’s API?
The development team wants to fail CI jobs where a specific CVE is contained within the image. How should the development team configure the pipeline or policy to produce this outcome?
The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.
Which type of policy should be created to protect this pod from Layer7 attacks?
Which IAM Azure RQL query would correctly generate an output to view users who have sufficient permissions to create security groups within Azure AD and create applications?
Which two statements explain differences between build and run config policies? (Choose two.)