Question 1

How are the following categorized?
* Backdoor account access
* Hijacked processes
* Lateral movement
* Port scanning
  • Question 2

    Which two required request headers interface with Prisma Cloud API? (Choose two.)
  • Question 3

    A security team has been asked to create a custom policy.
    Which two methods can the team use to accomplish this goal? (Choose two.)
  • Question 4

    One of the resources on the network has triggered an alert for a Default Config policy.
    Given the following resource JSON snippet:

    Which RQL detected the vulnerability?



  • Question 5

    During an initial deployment of Prisma Cloud Compute, the customer sees vulnerabilities in their environment.
    Which statement correctly describes the default vulnerability policy?