c1 Flashcards
(65 cards)
Which two cloud-native providers are supported by Prisma Cloud? (Choose two.)
A. DigitalOcean
B. Azure
C. IBM Cloud
D. Oracle Cloud
B. Azure
D. Oracle Cloud
An image containing medium vulnerabilities that do not have available fixes is being deployed into the sock-shop namespace. Prisma Cloud has been configured for vulnerability management within the organization’s continuous integration (CI) tool and registry.
What will occur during the attempt to deploy this image from the CI tool into the sock-shop namespace?
A. The image will pass the CI policy, but will be blocked by the deployed policy; therefore, it will not be deployed.
B. The CI policy will fail the build; therefore, the image will not be deployed.
C. The image will be deployed successfully, and all vulnerabilities will be reported.
D. The image will be deployed successfully, but no vulnerabilities will be reported.
C. The image will be deployed successfully, and all vulnerabilities will be reported.
Which statement applies to optimization of registry scans with version pattern matching?
A. It requires Linux images to rely on optimizing registry scans due to various Linux elements.
B. It is only necessary in registries with tens of thousands of repositories and millions of images.
C. It is best practice to always optimize registry scans for faster results.
D. It is rarely successful in the Windows Operating System (OS).
C. It is best practice to always optimize registry scans for faster results.
What is the Prisma Cloud Enterprise required configuration to identify Amazon Web Services (AWS) Elastic Cloud Compute (EC2) distances that have been tagged as “Private”?
A. Open the Asset Dashboard, filter on tags, and choose “Private.”
B. Generate a CIS compliance report and review the “Asset Summary.”
C. Create an RQL config query to identify resources with the tag “Private.”
D. Create an RQL network query to identify traffic from resources tagged “Private.”
C. Create an RQL config query to identify resources with the tag “Private.”
Which two templates are supported by Cloud Code Security scan service? (Choose two.)
A. Azure Resource Manager (ARM)
B. Hyper Text Markup Language (HTML)
C. GitHub
D. Terraform
A. Azure Resource Manager (ARM)
D. Terraform
Which type of Prisma Cloud Enterprise alert supports autoremediation?
A. network
B. audit
C. anomaly
D. config
D. config
What subcommand invokes the Prisma Cloud Compute (PCC) edition image scanner?
A. > twistcli images scan
B. > twistcli project scan
C. > twistcli scan projects
D. > twistcli scan images
A. > twistcli images scan
Where can rules be configured and viewed to configure trusted images?
A. Monitor > Compliance > Trusted Images
B. Monitor > Compliance > Images
C. Defend > Compliance > Trusted Images
D. Defend > Compliance > Images
C. Defend > Compliance > Trusted Images
Which two elements does Prisma Cloud monitor when analyzing for unusual user activity? (Choose two.)
A. Operating System (OS)
B. browser
C. location
D. time
C. location
D. time
How does Prisma Cloud Enterprise autoremediate unwanted violations to public cloud infrastructure?
A. It inspects the application program interface (API) call made to public cloud and blocks the change if a policy violation is found.
B. It makes changes after a policy violation has been identified in monitoring.
C. It locks all changes to public cloud infrastructure and stops any configuration changes without prior approval.
D. It uses machine learning (ML) to identify unusual changes to infrastructure.
B. It makes changes after a policy violation has been identified in monitoring.
Which framework in Prisma Cloud can be used to provide general best practices when no specific legal requirements or regulatory standards need to be met?
A. Payment Card Industry (PCI) Data Security Standard (DSS) V3
B. Health Insurance Portability and Accountability Act (HIPAA)
C. Center for Internet Security (CIS) Benchmark
D. General Data Protection Regulation (GDPR)
C. Center for Internet Security (CIS) Benchmark
Which pattern syntax will add all images to a trusted images rule within a registry?
A. .acme.com
B. acme/
C. acme.com/myrepo/allimages:/*
D. registry.acme.com/*
D. registry.acme.com/*
Which Resource Query Language (RQL) query monitors all “delete” activities for the user “user1”?
A. event where crud = ‘delete’ AND subject = ‘user1’
B. event where crud = ‘delete’
C. event where crud = ‘delete’ AND subject = ‘user1’ AND cloud.type = ‘aws’
D. event where subject = ‘user1’
A. event where crud = ‘delete’ AND subject = ‘user1’
Which type of Resource Query Language (RQL) query is used to create a custom policy that looks for untagged resources?
A. config
B. alert
C. event
D. data
A. config
Which two data sources are ingested by Prisma Cloud? (Choose two.)
A. network flow logs
B. list of all database instances’ tables
C. metadata about compute resources’ configuration
D. Cortex Data Lake
A. network flow logs
C. metadata about compute resources’ configuration
Which Resource Query Language (RQL) query type monitors specific administrator activities?
A. Event
B. Network
C. User
D. Config
A. Event
Which Resource Query Language (RQL) string searches for all Elastic Block Store (EBS) volumes that do not have a “DataClassification” tag?
A. config cloud.resource from api.name = ‘aws-ec2-describe-volumes’ AND json.rule = tags[].key exists
B. config cloud.resource from api.name = ‘aws-ec2-describe-volumes’ AND json.rule = tags[].key = 1
C. config cloud.resource from api.name = ‘aws-ec2-describe-volumes’ AND json.rule = tags[].key contains DataClassification
D. config cloud.resource from api.name = ‘aws-ec2-describe-volumes’ AND json.rule = tags[].key does not contain DataClassification
D. config cloud.resource from api.name = ‘aws-ec2-describe-volumes’ AND json.rule = tags[*].key does not contain DataClassification
Which Resource Query Language (RQL) string using network query attributes returns all traffic destined for Internet or Suspicious IPs, what also exceed 1GB?
A. network from vpc.flow_record where publicnetwork = ( ‘Internet IPs’, ‘Suspicious IPs’ ) AND bytes > 1000000000
B. network from vpc.flow_record where bytes > 1GB and destination = ‘Internet IPs’ OR ‘Suspicious IPs’
C. show traffic from vpc.flow_record where destination.network = ( ‘Internet IPs’, ‘Suspicious IPs’ ) AND bytes > 1000000000
D. network from vpc.flow_record where dest.publicnetwork IN ( ‘Internet IPs’, ‘Suspicious IPs’ ) AND bytes > 1000000000
D. network from vpc.flow_record where dest.publicnetwork IN ( ‘Internet IPs’, ‘Suspicious IPs’ ) AND bytes > 1000000000
Which Resource Query Language (RQL) query monitors all traffic from the internet and suspicious internet protocols (IPs) destined for Amazon Web Services (AWS) databases?
A. network from vpc.flow_record where dest.resource IN ( resource where role = ‘Database’)
B. network from vpc.flow_record where source.publicnetworк IN ( ‘Suspicious IPs’ , ‘Internet IPs’ ) and dest.resource IN ( resource where role IN ( ‘LDAP’ ) )
C. network from vpc.flow_record where source. publicr.etwork IN ( ‘Suspicious IPs’ ) and dest.resource IN ( resource where role IN ( ‘AWS RDS’ , ‘Database’ ) )
D. network from vpc.flow_record where source.publicnetwork IN ( ‘Suspicious IPs’ , ‘Internet IPs’ ) and dest.resource IN ( resource where role IN ( ‘AWS RDS’ , ‘Database’ ) )
D. network from vpc.flow_record where source.publicnetwork IN ( ‘Suspicious IPs’ , ‘Internet IPs’ ) and dest.resource IN ( resource where role IN ( ‘AWS RDS’ , ‘Database’ ) )
A Prisma Cloud Administrator has been asked to create a custom policy which notifies the InfoSec team each time a configuration change is made to a Security group.
Which type of Resource Query Language (RQL) query would be used in this policy?
A. audit from
B. network from
C. event from
D. config from
C. event from
Which type of alert captures unusual user activity and excessive login failures?
A. Anomaly
B. Audit Event
C. Configuration
D. Network
A. Anomaly
Which two actions are appropriate when configuring Prisma Cloud to scan a registry? (Choose two.)
A. Allow Prisma Cloud to automatically optimize registry scans with version pattern matching.
B. Allow Prisma Cloud to automatically distribute the scan job across a pool of available Defenders.
C. Explicitly specify the Defender to do the job.
D. Explicitly specify the predefined version pattern-matching algorithm.
A. Allow Prisma Cloud to automatically optimize registry scans with version pattern matching.
B. Allow Prisma Cloud to automatically distribute the scan job across a pool of available Defenders.
Which two resource types are included in the Prisma Cloud Enterprise licensing count? (Choose two.)
A. Elastic Compute Cloud (EC2) instances
B. Network Address Translation (NAT) gateways
C. CloudFront distributions
D. Security groups
A. Elastic Compute Cloud (EC2) instances
C. CloudFront distributions
What is a permanent public IP called on Amazon Web Services (AWS)?
A. floating IP
B. Public IP (PIP)
C. reserved IP
D. Elastic IP (EIP)
D. Elastic IP (EIP)