A customer has serverless functions that are deployed in multiple clouds.
Which serverless cloud provider is covered be “overly permissive service access†compliance check?
Which component of a Kubernetes setup can approve, modify, or reject administrative requests?
You have onboarded a public cloud account into Prisma Cloud Enterprise. Configuration Resource ingestion is visible in the Asset Inventory for the onboarded account, but no alerts are being generated for the configuration assets in the account.
Config policies are enabled in the Prisma Cloud Enterprise tenant, with those policies associated to existing alert rules. ROL statements on the investigate matching those policies return config resource results successfully.
Why are no alerts being generated?
Which two CI/CD plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.).
You wish to create a custom policy with build and run subtypes. Match the query types for each example.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
Which two bot categories belong to unknown bots under Web-Application and API Security (WAAS) bot protection? (Choose two.)
An administrator has added a Cloud account on Prisma Cloud and then deleted it.
What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?
The security team wants to protect a web application container from an SQLi attack. Which type of policy should the administrator create to protect the container?
The Compute Console has recently been upgraded, and the administrator plans to delay upgrading the Defenders and the Twistcli tool until some of the team’s resources have been rescaled. The Console is currently one major release ahead.
What will happen as a result of the Console upgrade?
Which statement is true about obtaining Console images for Prisma Cloud Compute Edition?
Which three types of buckets exposure are available in the Data Security module? (Choose three.)
An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type Aâ€.
Why would this message appear as an audit?
Which of the below actions would indicate – “The timestamp on the compliance dashboard?
A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt. The DevOps lead only has access to vulnerability data in Prisma Cloud Compute, so the DevOps lead passes this information to SecOps.
Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?
An administrator sees that a runtime audit has been generated for a host. The audit message is:
“Service postfix attempted to obtain capability SHELL by executing /bin/sh /usr/libexec/postfix/postfix- script.stop. Low severity audit, event is automatically added to the runtime modelâ€
Which runtime host policy rule is the root cause for this runtime audit?
Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)
In WAAS Access control file upload controls, which three file types are supported out of the box? (Choose three.)
A customer has Prisma Cloud Enterprise and host Defenders deployed.
What are two options that allow an administrator to upgrade Defenders? (Choose two.)
What is the order of steps in a Jenkins pipeline scan?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Which two statements explain differences between build and run config policies? (Choose two.)
The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely.
Which strategy should the administrator use to achieve this goal?
A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company’s AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded individually.
The business unit has decided to cover the scope of this action and determined that a script should be written to onboard each of these accounts with general settings to gain immediate posture visibility across the accounts.
Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?
An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query programmatically the existing users, and the user’s associated permission levels, in a Prisma Cloud Enterprise tenant.
Which public documentation location should be reviewed to help determine the required attributes to carry out this step?
On which cloud service providers can you receive new API release information for Prisma Cloud?
The compliance team needs to associate Prisma Cloud policies with compliance frameworks. Which option should the team select to perform this task?
Which RQL query will help create a custom identity and access management (1AM) policy to alert on Lambda functions that have permission to terminate EC2 instances?
When configuring SSO how many IdP providers can be enabled for all the cloud accounts monitored by Prisma Cloud?
Which order of steps map a policy to a custom compliance standard?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
What are two alarm types that are registered after alarms are enabled? (Choose two.)
The security team wants to enable the “block†option under compliance checks on the host.
What effect will this option have if it violates the compliance check?
A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?
Which two bot types are part of Web Application and API Security (WAAS) bot protection? (Choose two.)
Which policy type provides information about connections from suspicious IPs in a customer database?
The administrator wants to review the Console audit logs from within the Console.
Which page in the Console should the administrator use to review this data, if it can be reviewed at all?
Which two information types cannot be seen in the data security dashboard? (Choose two).
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
Which policy type should be used to detect and alert on cryptominer network activity?
What are two ways to scan container images in Jenkins pipelines? (Choose two.)
What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?
Which three elements are part of SSH Events in Host Observations? (Choose three.)
Put the steps involved to configure and scan using the IntelliJ plugin in the correct order.
The Prisma Cloud administrator has configured a new policy.
Which steps should be used to assign this policy to a compliance standard?
What are two built-in RBAC permission groups for Prisma Cloud? (Choose two.)
Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)
An administrator needs to detect and alert on any activities performed by a root account.
Which policy type should be used?
Which two fields are required to configure SSO in Prisma Cloud? (Choose two.)
A customer's Security Operations Center (SOC) team wants to receive alerts from Prisma Cloud via email once a day about all policies that have a violation, rather than receiving an alert every time a new violation occurs.
Which alert rule configuration meets this requirement?
Given the following audit event activity snippet:
Which RQL will be triggered by the audit event?
A)
B)
C)
D)
A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?
When an alert notification from the alarm center is deleted, how many hours will a similar alarm be suppressed by default?
Which two CI/CD plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
Order the steps involved in onboarding an AWS Account for use with Data Security feature.
Which three serverless runtimes are supported by Prisma Cloud for vulnerability and compliance scans? (Choose three.)
What is required for Prisma Cloud to successfully execute auto-remediation commands?
Which role must be assigned to DevOps users who need access to deploy Container and Host Defenders in Compute?
Which three options are selectable in a CI policy for image scanning with Jenkins or twistcli? (Choose three.)
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
Which two offerings will scan container images in Jenkins pipelines? (Choose two.)
Move the steps to the correct order to set up and execute a serverless scan using AWS DevOps.
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
A customer has multiple violations in the environment including:
User namespace is enabled
An LDAP server is enabled
SSH root is enabled
Which section of Console should the administrator use to review these findings?
Creation of a new custom compliance standard that is based on other individual custom compliance standards needs to be automated.
Assuming the necessary data from other standards has been collected, which API order should be used for this new compliance standard?
Which three OWASP protections are part of Prisma Cloud Web-Application and API Security (WAAS) rule? (Choose three.)