A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
Which policy type should be used to detect and alert on cryptominer network activity?
What are two ways to scan container images in Jenkins pipelines? (Choose two.)
What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?
Which three elements are part of SSH Events in Host Observations? (Choose three.)
Put the steps involved to configure and scan using the IntelliJ plugin in the correct order.
The Prisma Cloud administrator has configured a new policy.
Which steps should be used to assign this policy to a compliance standard?
What are two built-in RBAC permission groups for Prisma Cloud? (Choose two.)