Move the steps to the correct order to set up and execute a serverless scan using AWS DevOps.
Which step should a SecOps engineer implement in order to create a network exposure policy that identifies instances accessible from any untrusted internet sources?
Which serverless cloud provider is covered by the "overly permissive service access" compliance check?
When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?
Given the following JSON query:
$.resource[*].aws_s3_bucket exists
Which tab is the correct place to add the JSON query when creating a Config policy?
How many CLI remediation commands can be added in a custom policy sequence?
An administrator wants to retrieve the compliance policies for images scanned in a continuous integration (CI) pipeline.
Which endpoint will successfully execute to enable access to the images via API?
Anomaly policy uses which two logs to identify unusual network and user activity? (Choose two.)
An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type A”.
Why would this message appear as an audit?
An administrator has added a Cloud account on Prisma Cloud and then deleted it.
What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?
How are the following categorized?
Backdoor account access Hijacked processes Lateral movement
Port scanning
What should be used to associate Prisma Cloud policies with compliance frameworks?
Which option shows the steps to install the Console in a Kubernetes Cluster?
Which ban for DoS protection will enforce a rate limit for users who are unable to post five (5) “. tar.gz" files within five (5) seconds?
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
Which two required request headers interface with Prisma Cloud API? (Choose two.)
Given an existing ECS Cluster, which option shows the steps required to install the Console in Amazon ECS?
What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?
An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query programmatically the existing users, and the user’s associated permission levels, in a Prisma Cloud Enterprise tenant.
Which public documentation location should be reviewed to help determine the required attributes to carry out this step?
Which three incident types will be reflected in the Incident Explorer section of Runtime Defense? (Choose three.)
Given this information:
The Console is located at https://prisma-console.mydomain.local The username is: cluster
The password is: password123
The image to scan is: myimage:latest
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
Which type of RQL query should be run to determine if AWS Elastic Compute Cloud (EC2) instances without encryption was enabled?
Which three AWS policy types and identities are used to calculate the net effective permissions? (Choose three).
An administrator has access to a Prisma Cloud Enterprise.
What are the steps to deploy a single container Defender on an ec2 node?
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
Which of the below actions would indicate – “The timestamp on the compliance dashboard?
Match the service on the right that evaluates each exposure type on the left.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
What is the maximum number of access keys a user can generate in Prisma Cloud with a System Admin role?
Which ROL query is used to detect certain high-risk activities executed by a root user in AWS?
In Prisma Cloud Software Release 22.06 (Kepler), which Registry type is added?
Which Prisma Cloud policy type detects port scanning activities in a customer environment?
What improves product operationalization by adding visibility into feature utilization and missed opportunities?
What will happen when a Prisma Cloud Administrator has configured agentless scanning in an environment that also has Host and Container Defenders deployed?
A customer has a large environment that needs to upgrade Console without upgrading all Defenders at one time.
What are two prerequisites prior to performing a rolling upgrade of Defenders? (Choose two.)
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?
An administrator of Prisma Cloud wants to enable role-based access control for Docker engine.
Which configuration step is needed first to accomplish this task?
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
An organization wants to be notified immediately to any “High Severity” alerts for the account group “Clinical Trials” via Slack.
Which option shows the steps the organization can use to achieve this goal?
In which two ways can Prisma Cloud images be retrieved in Prisma Cloud Compute Self-Hosted Edition? (Choose two.)
Which three types of buckets exposure are available in the Data Security module? (Choose three.)
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
Creation of a new custom compliance standard that is based on other individual custom compliance standards needs to be automated.
Assuming the necessary data from other standards has been collected, which API order should be used for this new compliance standard?
Which of the following is not a supported external integration for receiving Prisma Cloud Code Security notifications?
An administrator sees that a runtime audit has been generated for a container.
The audit message is:
“/bin/ls launched and is explicitly blocked in the runtime rule. Full command: ls -latr”
Which protection in the runtime rule would cause this audit?
Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.
Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?
Which policy type should be used to detect and alert on cryptominer network activity?
The security team wants to enable the “block” option under compliance checks on the host.
What effect will this option have if it violates the compliance check?
A customer wants to harden its environment from misconfiguration.
Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)
On which cloud service providers can you receive new API release information for Prisma Cloud?
A customer has a requirement to scan serverless functions for vulnerabilities.
What is the correct option to configure scanning?
On which cloud service providers can new API release information for Prisma Cloud be received?
Match the correct scanning mode for each given operation.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?
An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant.
In which order will the APIs be executed for this service?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Given the following RQL:
event from cloud.audit_logs where operation IN (‘CreateCryptoKey’, ‘DestroyCryptoKeyVersion’, ‘v1.compute.disks.createSnapshot’)
Which audit event snippet is identified?
A)
B)
C)
D)
Put the steps involved to configure and scan using the IntelliJ plugin in the correct order.
The security team wants to protect a web application container from an SQLi attack. Which type of policy should the administrator create to protect the container?
A customer has a requirement to automatically protect all Lambda functions with runtime protection. What is the process to automatically protect all the Lambda functions?
A customer wants to monitor its Amazon Web Services (AWS) accounts via Prisma Cloud, but only needs the resource configuration to be monitored at present.
Which two pieces of information are needed to onboard this account? (Choose two.)
A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company’s AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded individually.
The business unit has decided to cover the scope of this action and determined that a script should be written to onboard each of these accounts with general settings to gain immediate posture visibility across the accounts.
Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?
A customer has configured the JIT, and the user created by the process is trying to log in to the Prisma Cloud console. The user encounters the following error message:
What is the reason for the error message?
What is the order of steps to create a custom network policy?
(Drag the steps into the correct order of occurrence, from the first step to the last.)