Page 1 out of 23. Viewing questions 1-10 out of 221
Question 1
DRAG DROP You wish to create a custom policy with build and run subtypes. Match the query types for each example. (Select your answer from the pull-down list. Answers may be used more than once or not at all.) Select and Place:
Which two integrated development environment (IDE) plugins are supported by Prisma Cloud as part of its Code Security? (Choose two.)
A.
BitBucket
B.
Visual Studio Code
C.
CircleCI
D.
IntelliJ
Answer:
ad
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 3
A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt. The DevOps lead only has access to vulnerability data in Prisma Cloud Compute, so the DevOps lead passes this information to SecOps. Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?
A.
The SecOps lead should investigate the attack using Vulnerability Explorer and Runtime Radar.
B.
The SecOps lead should use Incident Explorer and Compliance Explorer.
C.
The SecOps lead should use the Incident Explorer page and Monitor > Events > Container Audits.
D.
The SecOps lead should review the vulnerability scans in the CI/CD process to determine blame.
Per security requirements, an administrator needs to provide a list of people who are receiving e-mails for Prisma Cloud alerts. Where can the administrator locate this list of e-mail recipients?
A.
Target section within an Alert Rule.
B.
Notification Template section within Alerts.
C.
Users section within Settings.
D.
Set Alert Notification section within an Alert Rule.
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 7
A customer has a requirement to restrict any container from resolving the name www.evil-url.com.
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
A.
Choose copy into rule for any Container, set www.evil-url.com as a blocklisted DNS name in the Container policy and set the policy effect to alert.
B.
Set www.evil-url.com as a blocklisted DNS name in the default Container runtime policy, and set the effect to block.
C.
Choose copy into rule for any Container, set www.evil-url.com as a blocklisted DNS name, and set the effect to prevent.
D.
Set www.evil-url.com as a blocklisted DNS name in the default Container policy and set the effect to prevent.
Answer:
a
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 8
How often do Defenders share logs with Console?
A.
Every 10 minutes
B.
Every 30 minutes
C.
Every 1 hour
D.
Real time
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 9
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
A.
Ensure functions are not overly permissive.
B.
Ensure host devices are not directly exposed to containers.
C.
Ensure images are created with a non-root user.
D.
Ensure compliant Docker daemon configuration.
Answer:
c
User Votes:
A
50%
B
50%
C
50%
D
50%
Discussions
0/ 1000
Question 10
Which three public cloud providers are supported for VM image scanning? (Choose three.)