An administrator needs to detect and alert on any activities performed by a root account.
Which policy type should be used?
An administrator of Prisma Cloud wants to enable role-based access control for Docker engine.
Which configuration step is needed first to accomplish this task?
An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type A”.
Why would this message appear as an audit?
Which three AWS policy types and identities are used to calculate the net effective permissions? (Choose three).
Which file extension type is supported for Malware scanning in Prisma Cloud Data Security (PCDS)?
Which two statements are true about the differences between build and run config policies? (Choose two.)
Match the service on the right that evaluates each exposure type on the left.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?
A container and image compliance rule has been configured by enabling all checks; however, upon review, the container's compliance view reveals only the entries in the image below.
What is the appropriate action to take next?
The administrator wants to review the Console audit logs from within the Console.
Which page in the Console should the administrator use to review this data, if it can be reviewed at all?
Which component(s), if any, will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?
A customer has Prisma Cloud Enterprise and host Defenders deployed.
What are two options that allow an administrator to upgrade Defenders? (Choose two.)
Which order of steps map a policy to a custom compliance standard?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
The Prisma Cloud administrator has configured a new policy.
Which steps should be used to assign this policy to a compliance standard?
An administrator has added a Cloud account on Prisma Cloud and then deleted it.
What will happen if the deleted account is added back on Prisma Cloud within a 24-hour period?
Which two IDE plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.)
The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely.
Which strategy should the administrator use to achieve this goal?
Which step is included when configuring Kubernetes to use Prisma Cloud Compute as an admission controller?
When an alert notification from the alarm center is deleted, how many hours will a similar alarm be suppressed by default?
What are two key requirements for integrating Okta with Prisma Cloud when multiple Amazon Web Services (AWS) cloud accounts are being used? (Choose two.)
An S3 bucket within AWS has generated an alert by violating the Prisma Cloud Default policy “AWS S3 buckets are accessible to public”. The policy definition follows:
config where cloud.type = 'aws' AND api.name='aws-s3api-get-bucket-acl' AND json.rule="((((acl.grants[? (@.grantee=='AllUsers')] size > 0) or policyStatus.isPublic is true) and publicAccessBlockConfiguration does not exist) or ((acl.grants[?(@.grantee=='AllUsers')] size > 0) and publicAccessBlockConfiguration.ignorePublicAcis is false) or (policyStatus.isPublic is true and publicAccessBlockConfiguration.restrictPublicBuckets is false)) and websiteConfiguration does not exist"
Why did this alert get generated?
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
Which two statements explain differences between build and run config policies? (Choose two.)
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?
Which two required request headers interface with Prisma Cloud API? (Choose two.)
How are the following categorized?
Backdoor account access Hijacked processes Lateral movement
Port scanning
Which resources can be added in scope while creating a vulnerability policy for continuous integration?
A customer is interested in PCI requirements and needs to ensure that no privilege containers can start in the environment.
Which action needs to be set for “do not use privileged containers”?
Which action would be applicable after enabling anomalous compute provisioning?
A security team has a requirement to ensure the environment is scanned for vulnerabilities. What are three options for configuring vulnerability policies? (Choose three.)
Given this information:
The Console is located at https://prisma-console.mydomain.local The username is: cluster
The password is: password123
The image to scan is: myimage:latest
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt. The DevOps lead only has access to vulnerability data in Prisma Cloud Compute, so the DevOps lead passes this information to SecOps.
Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?
Which two integrations enable ingesting host findings to generate alerts? (Choose two.)
You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant’s existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.
Which option shows the steps required during the alert rule creation process to achieve this objective?
Which type of RQL query should be run to determine if AWS Elastic Compute Cloud (EC2) instances without encryption was enabled?
Which two CI/CD plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.).
What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?
What is the order of steps to create a custom network policy?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Which component of a Kubernetes setup can approve, modify, or reject administrative requests?
Which two elements are included in the audit trail section of the asset detail view? (Choose two).
Which action must be taken to enable a user to interact programmatically with the Prisma Cloud APIs and for a nonhuman entity to be enabled for the access keys?
Order the steps involved in onboarding an AWS Account for use with Data Security feature.
A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80.
Which port should the team specify in the CNAF rule to protect the application?
A customer has a requirement to scan serverless functions for vulnerabilities.
What is the correct option to configure scanning?
Which two bot types are part of Web Application and API Security (WAAS) bot protection? (Choose two.)
Which resource and policy type are used to calculate AWS Net Effective Permissions? (Choose two.)
Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)
A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?
Which ROL query is used to detect certain high-risk activities executed by a root user in AWS?
Given the following audit event activity snippet:
Which RQL will be triggered by the audit event?
A)
B)
C)
D)
Match the correct scanning mode for each given operation.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
Which three serverless runtimes are supported by Prisma Cloud for vulnerability and compliance scans? (Choose three.)
Prisma Cloud supports sending audit event records to which three targets? (Choose three.)
An organization wants to be notified immediately to any “High Severity” alerts for the account group “Clinical Trials” via Slack.
Which option shows the steps the organization can use to achieve this goal?
An administrator wants to retrieve the compliance policies for images scanned in a continuous integration (CI) pipeline.
Which endpoint will successfully execute to enable access to the images via API?
Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).
What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?