New Year Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Given the following RQL:

event from cloud.audit_logs where operation IN (‘CreateCryptoKey’, ‘DestroyCryptoKeyVersion’, ‘v1.compute.disks.createSnapshot’)

Which audit event snippet is identified?

A)

B)

C)

D)

A.

Option A

B.

Option B

C.

Option C

D.

Option D

Which three types of runtime rules can be created? (Choose three.)

A.

Processes

B.

Network-outgoing

C.

Filesystem

D.

Kubernetes-audit

E.

Waas-request

An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant.

In which order will the APIs be executed for this service?

(Drag the steps into the correct order of occurrence, from the first step to the last.)

What are two ways to scan container images in Jenkins pipelines? (Choose two.)

A.

twistcli

B.

Jenkins Docker plugin

C.

Compute Jenkins plugin

D.

Compute Azure DevOps plugin

E.

Prisma Cloud Visual Studio Code plugin with Jenkins integration

Under which tactic is “Exploit Public-Facing Application” categorized in the ATT&CK framework?

A.

Defense Evasion

B.

Initial Access

C.

Execution

D.

Privilege Escalation

What is required for Prisma Cloud to successfully execute auto-remediation commands?

A.

Read access to the cloud platform

B.

Write access to the cloud platform

C.

Access to the cloud platform only for Azure

D.

Prisma Cloud requires no access to the cloud platform

A customer has a requirement to automatically protect all Lambda functions with runtime protection. What is the process to automatically protect all the Lambda functions?

A.

Configure a function scan policy from the Defend/Vulnerabilities/Functions page.

B.

Configure serverless radar from the Defend/Compliance/Cloud Platforms page.

C.

Configure a manually embedded Lambda Defender.

D.

Configure a serverless auto-protect rule for the functions.

Which two services require external notifications to be enabled for policy violations in the Prisma Cloud environment? (Choose two.)

A.

Splunk

B.

QROC

C.

SQS

D.

Email

Which statement is true about obtaining Console images for Prisma Cloud Compute Edition?

A.

To retrieve Prisma Cloud Console images using basic auth:1.Access registry.paloaltonetworks.com, and authenticate using ‘docker login’.2.Retrieve the Prisma Cloud Console images using ‘docker pull’.

B.

To retrieve Prisma Cloud Console images using basic auth:1.Access registry.twistlock.com, and authenticate using ‘docker login’.2.Retrieve the Prisma Cloud Console images using ‘docker pull’.

C.

To retrieve Prisma Cloud Console images using URL auth:1.Access registry-url-auth.twistlock.com, and authenticate using the user certificate.2.Retrieve the Prisma Cloud Console images using ‘docker pull’.

D.

To retrieve Prisma Cloud Console images using URL auth:1.Access registry-auth.twistlock.com, and authenticate using the user certificate.2.Retrieve the Prisma Cloud Console images using ‘docker pull’.

Which type of RQL query should be run to determine if AWS Elastic Compute Cloud (EC2) instances without encryption was enabled?

A.

NETWORK

B.

EVENT

C.

CONFIG

D.

SECURITY