A customer has a requirement to scan serverless functions for vulnerabilities.
Which three settings are required to configure serverless scanning? (Choose three.)
B C E
Explanation:
Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/21-04/prisma-cloud-compute-edition-
admin/vulnerability_management/serverless_functions.html
DRAG DROP
Move the steps to the correct order to set up and execute a serverless scan using AWS DevOps.
Select and Place:
A customer is deploying Defenders to a Fargate environment. It wants to understand the vulnerabilities in the image it is
deploying.
How should the customer automate vulnerability scanning for images deployed to Fargate?
A
Explanation:
Reference: https://blog.paloaltonetworks.com/prisma-cloud/securing-aws-fargate-tasks/
A customer is reviewing Container audits, and an audit has identified a cryptominer attack.
Which three options could have generated this audit? (Choose three.)
B C D
An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default
service endpoint and will be exporting to YAML.
Console Address: $CONSOLE_ADDRESS
Websocket Address: $WEBSOCKET_ADDRESS User: $ADMIN_USER
Which command generates the YAML file for Defender install?
D
Explanation:
Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-
compute/install/install_kubernetes.html
DRAG DROP
What is the order of steps to create a custom network policy?
(Drag the steps into the correct order of occurrence, from the first step to the last.)
Select and Place:
Explanation:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/
create-a-policy.html
What are the two ways to scope a CI policy for image scanning? (Choose two.)
B D
Explanation:
Reference: https://www.optiv.com/insights/source-zero/blog/defending-against-container-threats-palo-alto-prisma-cloud
Which options show the steps required after upgrade of Console?
C
DRAG DROP
An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days.
In which order should the API calls be used to accomplish this task?
(Drag the steps into the correct order from the first step to the last.)
Select and Place:
An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query
programmatically the existing users, and the users associated permission levels, in a Prisma Cloud Enterprise tenant.
Which public documentation location should be reviewed to help determine the required attributes to carry out this step?
D
Explanation:
Reference: https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin.html