Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > Paloalto Networks > Cloud Security Engineer > CloudSec-Pro

CloudSec-Pro Palo Alto Networks Cloud Security Professional Question and Answers

Question # 4

A security team has been asked to create a custom policy.

Which two methods can the team use to accomplish this goal? (Choose two.)

A.

add a new policy

B.

clone an existing policy

C.

disable an out-of-the-box policy

D.

edit the query in the out-of-the-box policy

Full Access
Question # 5

A Prisma Cloud Administrator needs to enable a Registry Scanning for a registry that stores Windows images. Which of the following statement is correct regarding this process?

A.

They can deploy any type of container defender to scan this registry.

B.

There are Windows host defenders deployed in your environment already.

C.

There are Windows host defenders deployed in your environment already. Therefore, they do not need to deploy any additional defenders.

D.

A defender is not required to configure this type of registry scan.

Full Access
Question # 6

An administrator has access to a Prisma Cloud Enterprise.

What are the steps to deploy a single container Defender on an ec2 node?

A.

Pull the Defender image to the ec2 node, copy and execute the curl | bash script, and start the Defender to ensure it is running.

B.

Execute the curl | bash script on the ec2 node.

C.

Configure the cloud credential in the console and allow cloud discovery to auto-protect the ec2 node.

D.

Generate DaemonSet file and apply DaemonSet to the twistlock namespace.

Full Access
Question # 7

A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt. The DevOps lead only has access to vulnerability data in Prisma Cloud Compute, so the DevOps lead passes this information to SecOps.

Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?

A.

The SecOps lead should investigate the attack using Vulnerability Explorer and Runtime Radar.

B.

The SecOps lead should use Incident Explorer and Compliance Explorer.

C.

The SecOps lead should use the Incident Explorer page and Monitor > Events > Container Audits.

D.

The SecOps lead should review the vulnerability scans in the CI/CD process to determine blame.

Full Access
Question # 8

Which container image scan is constructed correctly?

A.

twistcli images scan --docker-address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/ latest

B.

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 myimage/latest

C.

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest

D.

twistcli images scan --address https://us-west1.cloud.twistlock.com/us-3-123456789 --container myimage/ latest --details

Full Access
Question # 9

Which type of RQL query should be run to determine if AWS Elastic Compute Cloud (EC2) instances without encryption was enabled?

A.

NETWORK

B.

EVENT

C.

CONFIG

D.

SECURITY

Full Access
Question # 10

Which two actions are required in order to use the automated method within Amazon Web Services (AWS) Cloud to streamline the process of using remediation in the identity and access management (IAM) module? (Choose two.)

A.

Install boto3 & requests library.

B.

Configure IAM Azure remediation script.

C.

Integrate with Azure Service Bus.

D.

Configure IAM AWS remediation script.

Full Access
Question # 11

The exclamation mark on the resource explorer page would represent?

A.

resource has been deleted

B.

the resource was modified recently

C.

resource has alerts

D.

resource has compliance violation

Full Access
Question # 12

Which of the following is a reason for alert dismissal?

A.

SNOOZED_AUTO_CLOSE

B.

ALERT_RULE_ADDED

C.

POLICY_UPDATED

D.

USER_DELETED

Full Access
Question # 13

Which field is required during the creation of a custom config query?

A.

resource status

B.

api.name

C.

finding.type

D.

cloud.type

Full Access
Question # 14

A customer wants to monitor its Amazon Web Services (AWS) accounts via Prisma Cloud, but only needs the resource configuration to be monitored at present.

Which two pieces of information are needed to onboard this account? (Choose two.)

A.

External ID

B.

CloudTrail

C.

Active Directory ID

D.

RoleARN

Full Access
Question # 15

Which statement accurately characterizes SSO Integration on Prisma Cloud?

A.

Prisma Cloud supports IdP initiated SSO, and its SAML endpoint supports the POST and GET methods.

B.

Okta, Azure Active Directory, PingID, and others are supported via SAML.

C.

An administrator can configure different Identity Providers (IdP) for all the cloud accounts that Prisma Cloud monitors.

D.

An administrator who needs to access the Prisma Cloud API can use SSO after configuration.

Full Access
Question # 16

An administrator sees that a runtime audit has been generated for a host. The audit message is:

“Service postfix attempted to obtain capability SHELL by executing /bin/sh /usr/libexec/postfix/postfix- script.stop. Low severity audit, event is automatically added to the runtime model”

Which runtime host policy rule is the root cause for this runtime audit?

A.

Custom rule with specific configuration for file integrity

B.

Custom rule with specific configuration for networking

C.

Default rule that alerts on capabilities

D.

Default rule that alerts on suspicious runtime behavior

Full Access
Question # 17

Which three options for hardening a customer environment against misconfiguration are included in Prisma Cloud Compute compliance enforcement for hosts? (Choose three.)

A.

Serverless functions

B.

Docker daemon configuration

C.

Cloud provider tags

D.

Host configuration

E.

Hosts without Defender agents

Full Access
Question # 18

In Prisma Cloud for Azure Net Effective Permissions Calculation, the following Azure permission levels are supported by which three permissions? (Choose three).

A.

Resources

B.

Tenant

C.

Subscription

D.

Resource groups

E.

Management Group

Full Access
Question # 19

Which two information types cannot be seen in the data security dashboard? (Choose two).

A.

Bucket owner

B.

Object Data Profile by Region

C.

Top Publicly Exposed Objects By Data Profile

D.

Object content

E.

Total objects

Full Access
Question # 20

Which policy type in Prisma Cloud can protect against malware?

A.

Data

B.

Config

C.

Network

D.

Event

Full Access
Question # 21

Which two integrations enable ingesting host findings to generate alerts? (Choose two.)

A.

Splunk

B.

Tenable

C.

JIRA

D.

Qualys

Full Access
Question # 22

What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?

A.

policy

B.

incident

C.

audit

D.

anomaly

Full Access
Question # 23

You are an existing customer of Prisma Cloud Enterprise. You want to onboard a public cloud account and immediately see all of the alerts associated with this account based off ALL of your tenant’s existing enabled policies. There is no requirement to send alerts from this account to a downstream application at this time.

Which option shows the steps required during the alert rule creation process to achieve this objective?

A.

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert ruleSelect “select all policies” checkbox as part of the alert rule Confirm the alert rule

B.

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert ruleSelect one or more policies checkbox as part of the alert rule Confirm the alert rule

C.

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert ruleSelect one or more policies as part of the alert rule Add alert notificationsConfirm the alert rule

D.

Ensure the public cloud account is assigned to an account group Assign the confirmed account group to alert ruleSelect “select all policies” checkbox as part of the alert rule Add alert notificationsConfirm the alert rule

Full Access
Question # 24

What are two key requirements for integrating Okta with Prisma Cloud when multiple Amazon Web Services (AWS) cloud accounts are being used? (Choose two.)

A.

Super Administrator permissions

B.

A valid subscription for the IAM security module

C.

An Okta API token for the primary AWS account

D.

Multiple instances of the Okta app

Full Access
Question # 25

You are tasked with configuring a Prisma Cloud build policy for Terraform. What type of query is necessary to complete this policy?

A.

YAML

B.

JSON

C.

CloudFormation

D.

Terraform

Full Access
Question # 26

Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)

A.

HTTP

B.

SSH

C.

Tomcat Web Connector via AJP

D.

TLS

Full Access
Question # 27

Which two statements are true about the differences between build and run config policies? (Choose two.)

A.

Run and Network policies belong to the configuration policy set.

B.

Build and Audit Events policies belong to the configuration policy set.

C.

Run policies monitor resources, and check for potential issues after these cloud resources are deployed.

D.

Build policies enable you to check for security misconfigurations in the IaC templates and ensure that these issues do not get into production.

E.

Run policies monitor network activities in your environment, and check for potential issues during runtime.

Full Access
Question # 28

Which statement about build and run policies is true?

A.

Build policies enable you to check for security misconfigurations in the IaC templates.

B.

Every type of policy has auto-remediation enabled by default.

C.

The four main types of policies are: Audit Events, Build, Network, and Run.

D.

Run policies monitor network activities in the environment and check for potential issues during runtime.

Full Access
Question # 29

Which RQL query type is invalid?

A.

Event

B.

IAM

C.

Incident

D.

Config

Full Access
Question # 30

Put the steps of integrating Okta with Prisma Cloud in the right order in relation to CIEM or SSO okra integration.

Full Access
Question # 31

Which Prisma Cloud policy type detects port scanning activities in a customer environment?

A.

Port Scan

B.

Anomaly

C.

Config

D.

Network

Full Access
Question # 32

Which two bot categories belong to unknown bots under Web-Application and API Security (WAAS) bot protection? (Choose two.)

A.

News bots

B.

Search engine crawlers

C.

Web scrapers

D.

HTTP libraries

Full Access
Question # 33

Which three public cloud providers are supported for VM image scanning? (Choose three.)

A.

GCP

B.

Alibaba

C.

Oracle

D.

AWS

E.

Azure

Full Access
Question # 34

The Prisma Cloud administrator has configured a new policy.

Which steps should be used to assign this policy to a compliance standard?

A.

Edit the policy, go to step 3 (Compliance Standards), click + at the bottom, select the compliance standard, fill in the other boxes, and then click Confirm.

B.

Create the Compliance Standard from Compliance tab, and then select Add to Policy.

C.

Open the Compliance Standards section of the policy, and then save.

D.

Custom policies cannot be added to existing standards.

Full Access
Question # 35

A customer has Defenders connected to Prisma Cloud Enterprise. The Defenders are deployed as a DaemonSet in OpenShift.

How should the administrator get a report of vulnerabilities on hosts?

A.

Navigate to Monitor > Vulnerabilities > CVE Viewer

B.

Navigate to Defend > Vulnerabilities > VM Images

C.

Navigate to Defend > Vulnerabilities > Hosts

D.

Navigate to Monitor > Vulnerabilities > Hosts

Full Access
Question # 36

What is a benefit of the Cloud Discovery feature?

A.

It does not require any specific permissions to be granted before use.

B.

It helps engineers find all cloud-native services being used only on AWS.

C.

It offers coverage for serverless functions on AWS only.

D.

It enables engineers to continuously monitor all accounts and report on the services that are unprotected.

Full Access
Question # 37

Which action would be applicable after enabling anomalous compute provisioning?

A.

It detects the activity caused by the spambot.

B.

It detects unusual server port activity or unusual protocol activity from a client within or outside the cloud environment.

C.

It detects potential creation of an unauthorized network of compute instances with AutoFocus.

D.

It detects potential creation of an unauthorized network of compute instances either accidentally or for cryptojacking.

Full Access
Question # 38

Which two filters are available in the SecOps dashboard? (Choose two.)

A.

Time range

B.

Account Groups

C.

Service Name

D.

Cloud Region

Full Access
Question # 39

What are the three states of the Container Runtime Model? (Choose three.)

A.

Initiating

B.

Learning

C.

Active

D.

Running

E.

Archived

Full Access
Question # 40

How often do Defenders share logs with Console?

A.

Every 10 minutes

B.

Every 30 minutes

C.

Every 1 hour

D.

Real time

Full Access
Question # 41

The security team wants to protect a web application container from an SQLi attack. Which type of policy should the administrator create to protect the container?

A.

CNAF

B.

Runtime

C.

Compliance

D.

CNNF

Full Access
Question # 42

An administrator wants to install the Defenders to a Kubernetes cluster. This cluster is running the console on the default service endpoint and will be exporting to YAML.

Console Address: $CONSOLE_ADDRESS Websocket Address: $WEBSOCKET_ADDRESS User: $ADMIN_USER

Which command generates the YAML file for Defender install?

A.

/twistcli defender \--address $CONSOLE_ADDRESS \--user $ADMIN_USER \--cluster-address $CONSOLE_ADDRESS

B.

/twistcli defender export kubernetes \--address $WEBSOCKET_ADDRESS \--user $ADMIN_USER \--cluster-address $CONSOLE_ADDRESS

C.

/twistcli defender YAML kubernetes \--address $CONSOLE_ADDRESS \--user $ADMIN_USER \--cluster-address $WEBSOCKET_ADDRESS

D.

/twistcli defender export kubernetes \--address $CONSOLE_ADDRESS \--user $ADMIN_USER \--cluster-address $WEBSOCKET_ADDRESS

Full Access
Question # 43

Which of the following is displayed in the asset inventory?

A.

EC2 instances

B.

Asset tags

C.

SSO users

D.

Federated users

Full Access
Question # 44

Which data storage type is supported by Prisma Cloud Data Security?

A.

IBM Cloud Object Storage

B.

AWS S3 buckets

C.

Oracle Object Storage

D.

Google storage class

Full Access
Question # 45

What is the frequency to create a compliance report? (Choose two.)

A.

Weekly

B.

One time

C.

Monthly

D.

Recurring

Full Access
Question # 46

What happens when a role is deleted in Prisma Cloud?

A.

The access key associated with that role is automatically deleted.

B.

Any integrations that use the access key to make calls to Prisma Cloud will stop working.

C.

The users associated with that role will be deleted.

D.

Any user who uses that key will be deleted.

Full Access
Question # 47

Which file extension type is supported for Malware scanning in Prisma Cloud Data Security (PCDS)?

A.

.bat

B.

.apk

C.

.vb

D.

.py

Full Access
Question # 48

A security team has a requirement to ensure the environment is scanned for vulnerabilities. What are three options for configuring vulnerability policies? (Choose three.)

A.

individual actions based on package type

B.

output verbosity for blocked requests

C.

apply policy only when vendor fix is available

D.

individual grace periods for each severity level

E.

customize message on blocked requests

Full Access
Question # 49

The security team wants to target a CNAF policy for specific running Containers. How should the administrator scope the policy to target the Containers?

A.

scope the policy to Image names.

B.

scope the policy to namespaces.

C.

scope the policy to Defender names.

D.

scope the policy to Host names.

Full Access
Question # 50

Which step is included when configuring Kubernetes to use Prisma Cloud Compute as an admission controller?

A.

copy the Console address and set the config map for the default namespace.

B.

create a new namespace in Kubernetes called admission-controller.

C.

enable Kubernetes auditing from the Defend > Access > Kubernetes page in the Console.

D.

copy the admission controller configuration from the Console and apply it to Kubernetes.

Full Access
Question # 51

Which of the following are correct statements regarding the use of access keys? (Choose two.)

A.

Access keys must have an expiration date

B.

Up to two access keys can be active at any time

C.

System Admin can create access key for all users

D.

Access keys are used for API calls

Full Access
Question # 52

An S3 bucket within AWS has generated an alert by violating the Prisma Cloud Default policy “AWS S3 buckets are accessible to public”. The policy definition follows:

config where cloud.type = 'aws' AND api.name='aws-s3api-get-bucket-acl' AND json.rule="((((acl.grants[? (@.grantee=='AllUsers')] size > 0) or policyStatus.isPublic is true) and publicAccessBlockConfiguration does not exist) or ((acl.grants[?(@.grantee=='AllUsers')] size > 0) and publicAccessBlockConfiguration.ignorePublicAcis is false) or (policyStatus.isPublic is true and publicAccessBlockConfiguration.restrictPublicBuckets is false)) and websiteConfiguration does not exist"

Why did this alert get generated?

A.

an event within the cloud account

B.

network traffic to the S3 bucket

C.

configuration of the S3 bucket

D.

anomalous behaviors

Full Access
Question # 53

The attempted bytes count displays?

A.

traffic that is either denied by the security group or firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

B.

traffic that is either denied by the security group or firewall rules.

C.

traffic that is either denied by the firewall rules or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

D.

traffic denied by the security group or traffic that was reset by a host or virtual machine that received the packet and responded with a RST packet.

Full Access
Question # 54

What is the most reliable and extensive source for documentation on Prisma Cloud APIs?

A.

prisma.pan.dev

B.

docs.paloaltonetworks.com

C.

Prisma Cloud Administrator’s Guide

D.

Live Community

Full Access
Question # 55

What is an example of an outbound notification within Prisma Cloud?

A.

AWS Inspector

B.

Qualys

C.

Tenable

D.

PagerDuty

Full Access
Question # 56

If you are required to run in an air-gapped environment, which product should you install?

A.

Prisma Cloud Jenkins Plugin

B.

Prisma Cloud Compute Edition

C.

Prisma Cloud with self-hosted plugin

D.

Prisma Cloud Enterprise Edition

Full Access
Question # 57

Which two proper agentless scanning modes are supported with Prisma Cloud? (Choose two).

A.

Spoke Account Mode

B.

Hub Account Mode

C.

Same Account Mode

D.

Main Account Mode

Full Access
Question # 58

Given this information:

The Console is located at https://prisma-console.mydomain.local The username is: cluster

The password is: password123

The image to scan is: myimage:latest

Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?

A.

twistcli images scan --console-address https://prisma-console.mydomain.local -u cluster -p password123 -- details myimage:latest

B.

twistcli images scan --console-address prisma-console.mydomain.local -u cluster -p password123 -- vulnerability-details myimage:latest

C.

twistcli images scan --address prisma-console.mydomain.local -u cluster -p password123 --vulnerability- details myimage:latest

D.

twistcli images scan --address https://prisma-console.mydomain.local -u cluster -p password123 --details myimage:latest

Full Access
Question # 59

An administrator sees that a runtime audit has been generated for a container.

The audit message is:

“/bin/ls launched and is explicitly blocked in the runtime rule. Full command: ls -latr”

Which protection in the runtime rule would cause this audit?

A.

Networking

B.

File systems

C.

Processes

D.

Container

Full Access
Question # 60

A customer has Prisma Cloud Enterprise and host Defenders deployed.

What are two options that allow an administrator to upgrade Defenders? (Choose two.)

A.

with auto-upgrade, the host Defender will auto-upgrade.

B.

auto deploy the Lambda Defender.

C.

click the update button in the web-interface.

D.

generate a new DaemonSet file.

Full Access
Question # 61

The development team wants to block Cross Site Scripting attacks from pods in its environment. How should the team construct the CNAF policy to protect against this attack?

A.

create a Host CNAF policy, targeted at a specific resource, check the box for XSS attack protection, and set the action to “prevent”.

B.

create a Container CNAF policy, targeted at a specific resource, check the box for XSS attack protection, and set the action to alert.

C.

create a Container CNAF policy, targeted at a specific resource, check the box for XSS protection, and set the action to prevent.

D.

create a Container CNAF policy, targeted at a specific resource, and they should set “Explicitly allowed inbound IP sources” to the IP address of the pod.

Full Access
Question # 62

Which two roles have access to view the Prisma Cloud policies? (Choose two.)

A.

Build AND Deploy Security

B.

Auditor

C.

Dev SecOps

D.

Defender Manager

Full Access
Question # 63

How is the scope of each rule determined in the Prisma Cloud Compute host runtime policy?

A.

By the collection assigned to that rule

B.

By the target workload

C.

By the order in which it is created

D.

By the type of network traffic it controls

Full Access
Question # 64

A customer's Security Operations Center (SOC) team wants to receive alerts from Prisma Cloud via email once a day about all policies that have a violation, rather than receiving an alert every time a new violation occurs.

Which alert rule configuration meets this requirement?

A.

Configure an alert rule with all the defaults except selecting email within the "Alert Notifications" tab and specifying recipient.

B.

Configure an alert rule. Under the "Policies" tab, select "High Risk Severity Policies." In the "Set Alert Notifications" tab, select "Email > Recurring," set to repeat every 1 day, and enable "Email."

C.

Set up email integrations under the "Integrations" tab in "Settings" and create a notification template.

D.

Configure an alert rule. Under the "Policies" tab, select "All Policies." In the "Set Alert Notifications" tab, select "Email > Recurring," set to repeat every 1 day, and then enable "Email."

Full Access
Question # 65

Which step should a SecOps engineer implement in order to create a network exposure policy that identifies instances accessible from any untrusted internet sources?

A.

In Policy Section-> Add Policy-> Config type -> Define Policy details Like Name,Severity-> Configure RQL query "config from network where source.network = UNTRUSTJNTERNET and dest.resource.type = 'Instance' and dest.cloud.type = 'AWS*" -> define compliance standard -> Define recommendation for remediation & save.

B.

In Policy Section-> Add Policy-> Network type -> Define Policy details Like Name.Severity-> Configure RQL query "network from vpc.flow_record where source.publicnetwork IN ('Suspicious IPs', 'Internet IPs') and dest.resource IN (resource where role IN ('Instance ))" -> define compliance standard -> Define recommendation for remediation & save.

C.

In Policy Section-> Add Policy-> Network type -> Define Policy details Like Name.Severity-> Configure RQL query "network from vpc.flow_record where source.publicnetwork IN ('Suspicious IPs', 'Internet IPs') and dest.resource IN (resource where role IN ( Instance ))" -> define compliance standard -> Define recommendation for remediation & save.

D.

In Policy Section-> Add Policy-> Network type -> Define Policy details Like Name.Severity-> Configure RQL query "config from network where source.network = UNTRUSTJNTERNET and dest.resource.type = 'Instance' and dest.cloud.type = 'AWS'" -> Define recommendation for remediation & save.

Full Access
Question # 66

A customer wants to harden its environment from misconfiguration.

Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)

A.

Docker daemon configuration files

B.

Docker daemon configuration

C.

Host cloud provider tags

D.

Host configuration

E.

Hosts without Defender agents

Full Access
Question # 67

Which three Orchestrator types are supported when deploying Defender? (Choose three.)

A.

Red Hat OpenShift

B.

Amazon ECS

C.

Docker Swarm

D.

Azure ACS

E.

Kubernetes

Full Access
Question # 68

Where can a user submit an external new feature request?

A.

Aha

B.

Help Center

C.

Support Portal

D.

Feature Request

Full Access
Question # 69

Which data security default policy is able to scan for vulnerabilities?

A.

Objects containing Vulnerabilities

B.

Objects containing Threats

C.

Objects containing Malware

D.

Objects containing Exploits

Full Access
Question # 70

The Compute Console has recently been upgraded, and the administrator plans to delay upgrading the Defenders and the Twistcli tool until some of the team’s resources have been rescaled. The Console is currently one major release ahead.

What will happen as a result of the Console upgrade?

A.

Defenders will disconnect, and Twistcli will stop working.

B.

Defenders will disconnect, and Twistcli will remain working.

C.

Both Defenders and Twistcli will remain working.

D.

Defenders will remain connected, and Twistcli will stop working.

Full Access
Question # 71

The development team is building pods to host a web front end, and they want to protect these pods with an application firewall.

Which type of policy should be created to protect this pod from Layer7 attacks?

A.

The development team should create a WAAS rule for the host where these pods will be running.

B.

The development team should create a WAAS rule targeted at all resources on the host.

C.

The development team should create a runtime policy with networking protections.

D.

The development team should create a WAAS rule targeted at the image name of the pods.

Full Access
Question # 72

An administrator has been tasked with a requirement by your DevSecOps team to write a script to continuously query programmatically the existing users, and the user’s associated permission levels, in a Prisma Cloud Enterprise tenant.

Which public documentation location should be reviewed to help determine the required attributes to carry out this step?

A.

Prisma Cloud Administrator’s Guide (Compute)

B.

Prisma Cloud API Reference

C.

Prisma Cloud Compute API Reference

D.

Prisma Cloud Enterprise Administrator’s Guide

Full Access
Question # 73

A customer wants to turn on Auto Remediation.

Which policy type has the built-in CLI command for remediation?

A.

Anomaly

B.

Audit Event

C.

Network

D.

Config

Full Access
Question # 74

Which three types of runtime rules can be created? (Choose three.)

A.

Processes

B.

Network-outgoing

C.

Filesystem

D.

Kubernetes-audit

E.

Waas-request

Full Access
Question # 75

What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?

A.

To sort through large amounts of audit data manually in order to identify developing attacks

B.

To store large amounts of forensic data on the host where Console runs to enable a more rapid and effectiveresponse to incidents

C.

To correlate individual events to identify potential attacks and provide a sequence of process, file system, and network events for a comprehensive view of an incident

D.

To identify and suppress all audit events generated by the defender

Full Access
Question # 76

What must be created in order to receive notifications about alerts generated when the operator is away from the Prisma Cloud Console?

A.

Alarm rule

B.

Notification rule

C.

Alert rule

D.

Offline alert

Full Access
Question # 77

Taking which action will automatically enable all severity levels?

A.

Navigate to Settings > Enterprise Settings and enable all severity levels in the alarm center.

B.

Navigate to Policies > Settings and enable all severity levels in the alarm center.

C.

Navigate to Settings > Enterprise Settings and ensure all severity levels are checked under "auto-enable default policies.

D.

Navigate to Policies > Settings and ensure all severity levels are checked under "auto-enable default policies.

Full Access