A customer has a requirement to automatically protect all Lambda functions with runtime protection . What is the process to automatically protect all the Lambda functions?A . Configure a function scan policy from the Defend/Vulnerabilities/Functions page.B . Configure serverless radar from the Defend/Compliance/Cloud Platforms page.C . Configure a manually embedded Lambda Defender.D . Configure...
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
A customer has a requirement to restrict any container from resolving the name www.evil-url.com. How should the administrator configure Prisma Cloud Compute to satisfy this requirement?A . Choose “copy into rule” for any Container, set www.evil-url.com as a blocklisted DNS name in the Container policy and set the policy effect to alert.B . Set...
Which setting should you use to meet this customer’s request?
A customer does not want alerts to be generated from network traffic that originates from trusted internal networks. Which setting should you use to meet this customer’s request?A . Trusted Login IP AddressesB . Anomaly Trusted ListC . Trusted Alert IP AddressesD . Enterprise Alert Disposition View Answer Answer: C Explanation: Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-cloud-alerts/trusted-ip-addresses-on-prisma-cloud.html...
Which three types of classifications are available in the Data Security module? (Choose three.)
Which three types of classifications are available in the Data Security module? (Choose three.)A . Personally identifiable informationB . Malicious IPC . Compliance standardD . Financial informationE . Malware View Answer Answer: A,D,E Explanation: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-data-security.html...
What is the correct API endpoint?
A Prisma Cloud administrator is tasked with pulling a report via API. The Prisma Cloud tenant is located on app2.prismacloud.io. What is the correct API endpoint?A . https://api.prismacloud.ioB . https://api2.eu.prismacloud.ioC . httsp://api.prismacloud.cnD . https://api2.prismacloud.io View Answer Answer: D Explanation: https://prisma.pan.dev/api/cloud/api-urls/...
Which container scan is constructed correctly?
Which container scan is constructed correctly?A . twistcli images scan -u api -p api –address https://us-west1.cloud.twistlock.com/us-3-123456789 — container myimage/latestB . twistcli images scan –docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latestC . twistcli images scan -u api -p api –address https://us-west1.cloud.twistlock.com/us-3-123456789 –details myimage/latestD . twistcli images scan -u api -p api –docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest View Answer Answer: C...
In which order should the API calls be used to accomplish this task?
DRAG DROP An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days. In which order should the API calls be used to accomplish this task? (Drag the steps intothe correct order from the first step to the last.) Select and Place: View Answer Answer:...
Which two required request headers interface with Prisma Cloud API? (Choose two.)
Which two required request headers interface with Prisma Cloud API? (Choose two.)A . Content-type:application/jsonB . x-redlock-authC . >x-redlock-request-idD . Content-type:application/xml View Answer Answer: A,B Explanation: Reference: https://prisma.pan.dev/api/cloud/api-headers/...
Where can the administrator locate this list of e-mail recipients?
Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts. Where can the administrator locate this list of e-mail recipients?A . Target section within an Alert Rule.B . Notification Template section within Alerts.C . Users section within Settings.D . Set Alert Notification section within...
When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?
When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?A . when a serverless repository is scannedB . when a Container is started form an ImageC . when the Image is built and when a Container is started form an ImageD . when the Image is...