What is the Palo Alto Networks recommended setting for the Prisma Cloud Training Model Threshold?
Which statement applies to optimization of registry scans with version pattern matching?
What are the two options to dynamically register tags used by Dynamic Address Groups that are referenced in policy? (Choose two.)
What are two business values of Cloud Code Security? (Choose two.)
How can you use Prisma Public Cloud to identify Amazon EC2 instances that have been tagged as "Private?
A client has a sensitive internet-facing application server in Microsoft Azure and is concerned about resource exhaustion because of distributed denial-of-service attacks What can be configured on the VM-Series firewall to specifically protect this server against this type of attack?
What does Prisma Cloud execute to change public cloud infrastructure when autoremediation is enabled?
What are three examples of outbound traffic flow? (Choose three.)
A customer has just launched a Palo Alto Networks VM-Series NGFW into an Amazon Web Services VPC to protect a cloud hosted application. They are experiencing unpredictable results and have identified that the interfaces on the firewall are in the incorrect order
Which PAN-OS CLI command resolves this issue?
Which two types of Resource Query Language (RQL) queries can be used to create policies? (Choose two.)
Which three methods can provide application-level security for a web server instance on Amazon Web Services? (Choose three.)
In which two ways can Prisma Cloud Compute (PCC) edition be installed? (Choose two.)
Which two cloud-native providers are supported by Prisma Cloud? (Choose two.)
Which pattern syntax will add all images to a trusted images rule within a registry?
Which RQL string monitors all traffic from the Internet and Suspicious IPs destined for your Amazon Web Services databases''
Prisma Public Cloud enables compliance monitoring and reporting by mapping which configurations to compliance standards?
Which RQL string returns a list of all Azure virtual machines that are not currently running?
How does Prisma Cloud Enterprise autoremediate unwanted violations to public cloud infrastructure?
Which two deployment methods are supported for Prisma Cloud Compute (PCC) container Defenders? (Choose two.)
Which Amazon Web Services security service can provide host vulnerability information to Prisma Public Cloud?
What is the scope of the Amazon Web Services 1AM Service?
What is the Palo Alto Networks default Prisma Cloud setting for Alert Disposition to reduce the number of false positives?
Which Prisma Public Cloud policy alerts administrators to unusual user activity?
An administrator has deployed an AWS transit gateway and used multiple VPC spokes to segregate a multi-tier application. The administrator also created a security VPC with multiple VM-Series NGFWs in an active/active deployment model via ECMP using Amazon Web Services VPN-based attachments.
What must be configured on the firewall to avoid asymmetric routing?
Which two valid effects are used to deal with images within a rule for trusted images? (Choose two.)
What are two examples of Amazon Web Services logging services? (Choose two.)
Which two resources provide operational insight within the Prisma Cloud Asset Inventory? (Choose two.)
Under which operating systems (OSs) is twistcli supported?
What are two benefits of Cloud Security Posture Management (CSPM) over other solutions? (Choose two.)
Which subcommand invokes the scan for images built with Jenkins in an OpenShift environment?
All Amazon Regional Database Service (RDS)-deployed resources and the regions in which they are deployed can be identified by prisma Cloud using which two methods? (Choose two.)
Which pillar of the Prisma Cloud platform can secure outbound traffic, stop lateral attack movement, and block inbound threats?
Which statement applies to vulnerability management policies?
What resource is required to receive inbound traffic from the internet to VM-Series NGFW deployed as a gateway for Azure Stack workloads?