Which two cloud-native providers are supported by Prisma Cloud? (Choose two.)
ADigitalOcean
BAzure
CIBM Cloud
DOracle Cloud
How does Prisma Cloud Enterprise autoremediate unwanted violations to public cloud infrastructure?
AIt inspects the application program interface (API) call made to public cloud and blocks the change if a policy violation is found.
BIt makes changes after a policy violation has been identified in monitoring.
CIt locks all changes to public cloud infrastructure and stops any configuration changes without prior approval.
DIt uses machine learning (ML) to identify unusual changes to infrastructure.
Which framework in Prisma Cloud can be used to provide general best practices when no specific legal requirements or regulatory standards need to be met?
APayment Card Industry (PCI) Data Security Standard (DSS) V3
BHealth Insurance Portability and Accountability Act (HIPAA)
CCenter for Internet Security (CIS) Benchmark
DGeneral Data Protection Regulation (GDPR)
Which pattern syntax will add all images to a trusted images rule within a registry?
A*.acme.com
Bacme/*
Cacme.com/myrepo/allimages:/*
Dregistry.acme.com/*
Which Resource Query Language (RQL) query monitors all "delete" activities for the user "user1"?
Aevent where crud = 'delete' AND subject = 'user1'
Bevent where crud = 'delete'
Cevent where crud = 'delete' AND subject = 'user1' AND cloud.type = 'aws'
Devent where subject = 'user1'
Which type of Resource Query Language (RQL) query is used to create a custom policy that looks for untagged resources?
Aconfig
Balert
Cevent
Ddata
Which two data sources are ingested by Prisma Cloud? (Choose two.)
Anetwork flow logs
Blist of all database instances' tables
Cmetadata about compute resources' configuration
DCortex Data Lake
Which Resource Query Language (RQL) query type monitors specific administrator activities?
AEvent
BNetwork
CUser
DConfig
Which Resource Query Language (RQL) string searches for all Elastic Block Store (EBS) volumes that do not have a "DataClassification" tag?
Aconfig cloud.resource from api.name = 'aws-ec2-describe-volumes' AND json.rule = tags[*].key exists
Bconfig cloud.resource from api.name = 'aws-ec2-describe-volumes' AND json.rule = tags[*].key = 1
Cconfig cloud.resource from api.name = 'aws-ec2-describe-volumes' AND json.rule = tags[*].key contains DataClassification
Dconfig cloud.resource from api.name = 'aws-ec2-describe-volumes' AND json.rule = tags[*].key does not contain DataClassification
Which Resource Query Language (RQL) string using network query attributes returns all traffic destined for Internet or Suspicious IPs, what also exceed 1GB?
Anetwork from vpc.flow_record where publicnetwork = ( 'Internet IPs', 'Suspicious IPs' ) AND bytes > 1000000000
Bnetwork from vpc.flow_record where bytes > 1GB and destination = 'Internet IPs' OR 'Suspicious IPs'
Cshow traffic from vpc.flow_record where destination.network = ( 'Internet IPs', 'Suspicious IPs' ) AND bytes > 1000000000
Dnetwork from vpc.flow_record where dest.publicnetwork IN ( 'Internet IPs', 'Suspicious IPs' ) AND bytes > 1000000000
Which Resource Query Language (RQL) query monitors all traffic from the internet and suspicious internet protocols (IPs) destined for Amazon Web Services (AWS) databases?
Anetwork from vpc.flow_record where dest.resource IN ( resource where role = 'Database')
Bnetwork from vpc.flow_record where source.publicnetworк IN ( 'Suspicious IPs' , 'Internet IPs' ) and dest.resource IN ( resource where role IN ( 'LDAP' ) )
Cnetwork from vpc.flow_record where source. publicr.etwork IN ( 'Suspicious IPs' ) and dest.resource IN ( resource where role IN ( 'AWS RDS' , 'Database' ) )
Dnetwork from vpc.flow_record where source.publicnetwork IN ( 'Suspicious IPs' , 'Internet IPs' ) and dest.resource IN ( resource where role IN ( 'AWS RDS' , 'Database' ) )
An image containing medium vulnerabilities that do not have available fixes is being deployed into the sock-shop namespace. Prisma Cloud has been configured for vulnerability management within the organization's continuous integration (CI) tool and registry.
What will occur during the attempt to deploy this image from the CI tool into the sock-shop namespace?
AThe image will pass the CI policy, but will be blocked by the deployed policy; therefore, it will not be deployed.
BThe CI policy will fail the build; therefore, the image will not be deployed.
CThe image will be deployed successfully, and all vulnerabilities will be reported.
DThe image will be deployed successfully, but no vulnerabilities will be reported.
A Prisma Cloud Administrator has been asked to create a custom policy which notifies the InfoSec team each time a configuration range is made to a Security group.
Which type of Resource Query Language (RQL) query would be used in this policy?