Question 31
A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt. The DevOps lead only has access to vulnerability data in Prisma Cloud Compute, so the DevOps lead passes this information to SecOps.
Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?
Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?
Question 32
An administrator has deployed Console into a Kubernetes cluster running in AWS. The administrator also has configured a load balancer in TCP passthrough mode to listen on the same ports as the default Prisma Compute Console configuration In the build pipeline, the administrator wants twistcli to talk to Console over HTTPS Which port will twistcli need to use to access the Prisma Compute APIs?
Question 33
A customer has Prisma Cloud Enterprise and host Defenders deployed
What are two options that allow an administrator to upgrade Defenders'? (Choose two )
What are two options that allow an administrator to upgrade Defenders'? (Choose two )
Question 34
Given this information:
* The Console is located at https//prisma-console mydomain local
* The username is ciuser
* The password is password123
* The Image to scan is myimage latest
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
* The Console is located at https//prisma-console mydomain local
* The username is ciuser
* The password is password123
* The Image to scan is myimage latest
Which twistcli command should be used to scan a Container for vulnerabilities and display the details about each vulnerability?
Question 35
Which three types of classifications are available in the Data Security module? (Choose three.)