A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)
Where can Defender debug logs be viewed? (Choose two.)
A Prisma Cloud administrator is tasked with pulling a report via API. The Prisma Cloud tenant is located on app2.prismacloud.io.
What is the correct API endpoint?
What happens when a role is deleted in Prisma Cloud?
Which role must be assigned to DevOps users who need access to deploy Container and Host Defenders in Compute?
What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
The development team wants to block Cross Site Scripting attacks from pods in its environment. How should the team construct the CNAF policy to protect against this attack?
Which three options for hardening a customer environment against misconfiguration are included in Prisma Cloud Compute compliance enforcement for hosts? (Choose three.)