Question 11

A customer wants to scan a serverless function as part of a build process.
Which twistcli command can be used to scan serverless functions?
  • Question 12

    Which three types of buckets exposure are available in the Data Security module? (Choose three.)
  • Question 13

    Which order of steps map a policy to a custom compliance standard?
    (Drag the steps into the correct order of occurrence, from the first step to the last.)

    Question 14

    An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise.
    tenant-In which order will the APIs be executed for this service? (Drag the steps into the correct order of occurrence from the first step to the last)

    Question 15

    An administrator sees that a runtime audit has been generated for a Container The audit message is DNS resolution of suspicious name wikipedia.com. type A".
    Why would this message appear as an audit?