Which two information types cannot be seen in the data security dashboard? (Choose two).
Which of the following is not a supported external integration for receiving Prisma Cloud Code Security notifications?
Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?
A customer has multiple violations in the environment including:
User namespace is enabled
An LDAP server is enabled
SSH root is enabled
Which section of Console should the administrator use to review these findings?
A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
Which two of the following are required to be entered on the IdP side when setting up SSO in Prisma Cloud? (Choose two.)
Console is running in a Kubernetes cluster, and you need to deploy Defenders on nodes within this cluster.
Which option shows the steps to deploy the Defenders in Kubernetes using the default Console service name?
What is the behavior of Defenders when the Console is unreachable during upgrades?
Which three public cloud providers are supported for VM image scanning? (Choose three.)