Which port should the team specify in the CNAF rule to protect the application?

A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80. Which port should the team specify in the CNAF rule to protect the application?A...

March 6, 2023 No Comments READ MORE +

Which RQL query type is invalid?

Which RQL query type is invalid?A . Event B. IAM C. Incident D. ConfigView AnswerAnswer: B Explanation: RQL (Real-time Query Language) is a query language used to search, filter and analyze data in Prisma Cloud. The valid RQL query types are: ✑ Event: This type of query is used to...

March 6, 2023 No Comments READ MORE +

Which two filters are available in the SecOps dashboard? (Choose two.)

Which two filters are available in the SecOps dashboard? (Choose two.)A . Time range B. Account Groups C. Service Name D. Cloud RegionView AnswerAnswer: A,B

March 6, 2023 No Comments READ MORE +

Which two required request headers interface with Prisma Cloud API? (Choose two.)

Which two required request headers interface with Prisma Cloud API? (Choose two.)A . Content-type:application/json B. x-redlock-auth C. >x-redlock-request-id D. Content-type:application/xmlView AnswerAnswer: A,B Explanation: Reference: https://prisma.pan.dev/api/cloud/api-headers/

March 6, 2023 No Comments READ MORE +

Which action would be applicable after enabling anomalous compute provisioning?

Which action would be applicable after enabling anomalous compute provisioning?A . It detects the activity caused by the spambot. B. It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment. C. It detects potential creation of an unauthorized network of compute...

March 5, 2023 No Comments READ MORE +

The exclamation mark on the resource explorer page would represent?

The exclamation mark on the resource explorer page would represent?A . resource has been deleted B. the resource was modified recently C. resource has alerts D. resource has compliance violationView AnswerAnswer: B

March 5, 2023 No Comments READ MORE +

What is the order of steps in a Jenkins pipeline scan?

DRAG DROP What is the order of steps in a Jenkins pipeline scan? (Drag the steps into the correct order of occurrence, from the first step to the last.) View AnswerAnswer: Explanation: Table Description automatically generated with medium confidence

March 5, 2023 No Comments READ MORE +

What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?

What is the correct method for ensuring key-sensitive data related to SSNs and credit card numbers cannot be viewed in Dashboard > Data view during investigations?A . Go to Settings > Data > Snippet Masking and select Full Mask. B. Go to Settings > Data > Data Patterns, search for...

March 5, 2023 No Comments READ MORE +

Which command generates the YAML file for Defender install?

An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to YAML. Console Address: $CONSOLE_ADDRESS Websocket Address: $WEBSOCKET_ADDRESS User: $ADMIN_USER Which command generates the YAML file for Defender install?A . <PLATFORM>/twistcli defender --address...

March 5, 2023 No Comments READ MORE +

What type of query is necessary to complete this policy?

You are tasked with configuring a Prisma Cloud build policy for Terraform. What type of query is necessary to complete this policy?A . YAML B. JSON C. CloudFormation D. TerraformView AnswerAnswer: B Explanation: Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/create-a-policy/prisma-cloud-create-config-build-policy.html

March 5, 2023 No Comments READ MORE +