What is the process to automatically protect all the Lambda functions?

A customer has a requirement to automatically protect all Lambda functions with runtime protection . What is the process to automatically protect all the Lambda functions?A . Configure a function scan policy from the Defend/Vulnerabilities/Functions page.B . Configure serverless radar from the Defend/Compliance/Cloud Platforms page.C . Configure a manually embedded...

June 23, 2022 No Comments READ MORE +

How should the administrator configure Prisma Cloud Compute to satisfy this requirement?

A customer has a requirement to restrict any container from resolving the name www.evil-url.com. How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . Choose “copy into rule” for any Container, set www.evil-url.com as a blocklisted DNS name in the Container policy and set the policy effect...

June 23, 2022 No Comments READ MORE +

Which setting should you use to meet this customer’s request?

A customer does not want alerts to be generated from network traffic that originates from trusted internal networks. Which setting should you use to meet this customer’s request?A . Trusted Login IP AddressesB . Anomaly Trusted ListC . Trusted Alert IP AddressesD . Enterprise Alert DispositionView AnswerAnswer: C Explanation: Reference:...

June 23, 2022 No Comments READ MORE +

Which three types of classifications are available in the Data Security module? (Choose three.)

Which three types of classifications are available in the Data Security module? (Choose three.)A . Personally identifiable informationB . Malicious IPC . Compliance standardD . Financial informationE . MalwareView AnswerAnswer: A,D,E Explanation: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-data-security.html

June 21, 2022 No Comments READ MORE +

What is the correct API endpoint?

A Prisma Cloud administrator is tasked with pulling a report via API. The Prisma Cloud tenant is located on app2.prismacloud.io. What is the correct API endpoint?A . https://api.prismacloud.ioB . https://api2.eu.prismacloud.ioC . httsp://api.prismacloud.cnD . https://api2.prismacloud.ioView AnswerAnswer: D Explanation: https://prisma.pan.dev/api/cloud/api-urls/

June 21, 2022 No Comments READ MORE +

Which container scan is constructed correctly?

Which container scan is constructed correctly?A . twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 -- container myimage/latestB . twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latestC . twistcli images scan -u api -p api --address https://us-west1.cloud.twistlock.com/us-3-123456789 --details myimage/latestD . twistcli images scan -u api -p api --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latestView AnswerAnswer:...

June 20, 2022 No Comments READ MORE +

In which order should the API calls be used to accomplish this task?

DRAG DROP An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days. In which order should the API calls be used to accomplish this task? (Drag the steps intothe correct order from the first step to the last.) Select and...

June 19, 2022 No Comments READ MORE +

Which two required request headers interface with Prisma Cloud API? (Choose two.)

Which two required request headers interface with Prisma Cloud API? (Choose two.)A . Content-type:application/jsonB . x-redlock-authC . >x-redlock-request-idD . Content-type:application/xmlView AnswerAnswer: A,B Explanation: Reference: https://prisma.pan.dev/api/cloud/api-headers/

June 19, 2022 No Comments READ MORE +

Where can the administrator locate this list of e-mail recipients?

Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts. Where can the administrator locate this list of e-mail recipients?A . Target section within an Alert Rule.B . Notification Template section within Alerts.C . Users section within Settings.D . Set...

June 19, 2022 No Comments READ MORE +

When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?

When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?A . when a serverless repository is scannedB . when a Container is started form an ImageC . when the Image is built and when a Container is started form an ImageD ....

June 19, 2022 No Comments READ MORE +