The Prisma Cloud administrator has configured a new policy.
Which steps should be used to assign this policy to a compliance standard?
Answer : B
Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/create-a-policy.html
An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to
YAML.
✑ Console Address: $CONSOLE_ADDRESS
✑ Websocket Address: $WEBSOCKET_ADDRESS
✑ User: $ADMIN_USER
Which command generates the YAML file for Defender install?
Answer : D
Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin-compute/install/install_kubernetes.html
Which options show the steps required after upgrade of Console?
Answer : C
An organization wants to be notified immediately to any `High Severity` alerts for the account group `Clinical Trials` via Slack.
Which option shows the steps the organization can use to achieve this goal?
Answer : B
A business unit has acquired a company that has a very large AWS account footprint. The plan is to immediately start onboarding the new company's AWS accounts into Prisma Cloud Enterprise tenant immediately. The current company is currently not using AWS Organizations and will require each account to be onboarded individually.
The business unit has decided to cover the scope of this action and determined that a script should be written to onboard each of these accounts with general settings to gain immediate posture visibility across the accounts.
Which API endpoint will specifically add these accounts into the Prisma Cloud Enterprise tenant?
Answer : B
A security team has a requirement to ensure the environment is scanned for vulnerabilities.
What are three options for configuring vulnerability policies? (Choose three.)
Answer : BCD
Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/19-11/prisma-cloud-compute-edition-admin/vulnerability_management/ vuln_management_rules.html
The Unusual protocol activity (Internal) network anomaly is generating too many alerts. An administrator has been asked to tune it to the option that will generate the least number of events without disabling it entirely.
Which strategy should the administrator use to achieve this goal?
Answer : C
Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/prisma-cloud-policies/anomaly-policies.html
What is the behavior of Defenders when the Console is unreachable during upgrades?
Answer : D
Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/20-09/prisma-cloud-compute-edition-admin/upgrade/upgrade_process.html
How are the following categorized?
✑ Backdoor account access
✑ Hijacked processes
✑ Lateral movement
✑ Port scanning
Answer : B
DRAG DROP -
An administrator needs to write a script that automatically deactivates access keys that have not been used for 30 days.
In which order should the API calls be used to accomplish this task?
(Drag the steps into the correct order from the first step to the last.)
Select and Place:
Answer :
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?
Answer : D
Reference:
https://docs.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/get-started-with-prisma-cloud/access-the-prisma-cloud-api.html
Which option shows the steps to install the Console in a Kubernetes Cluster?
Answer : B
A customer has a requirement to automatically protect all Lambda functions with runtime protection.
What is the process to automatically protect all the Lambda functions?
Answer : D
Reference:
https://blog.paloaltonetworks.com/prisma-cloud/protect-serverless-functions/
Which statement accurately characterizes SSO Integration on Prisma Cloud?
Answer : A
Reference:
https://docs-new.paloaltonetworks.com/prisma/prisma-cloud/prisma-cloud-admin/manage-prisma-cloud-administrators/setup-sso-integration-on- prisma-cloud
DRAG DROP -
Match the service on the right that evaluates each exposure type on the left.
(Select your answer from the pull-down list. Answers may be used more than once or not at all.)
Select and Place:
Answer :
Reference:
https://www.paloaltonetworks.com/prisma/cloud/cloud-data-security
Have any questions or issues ? Please dont hesitate to contact us