A customer is interested in PCI requirements and needs to ensure that no privilege containers can start in the environment.
Which action needs to be set for “do not use privileged containers”?
Which action would be applicable after enabling anomalous compute provisioning?
A security team has a requirement to ensure the environment is scanned for vulnerabilities. What are three options for configuring vulnerability policies? (Choose three.)
When would a policy apply if the policy is set under Defend > Vulnerability > Images > Deployed?
Which type of compliance check is available for rules under Defend > Compliance > Containers and Images > CI?
Based on the following information, which RQL query will satisfy the requirement to identify VM hosts deployed to organization public cloud environments exposed to network traffic from the internet and affected by Text4Shell RCE (CVE-2022-42889) vulnerability?
• Network flow logs from all virtual private cloud (VPC) subnets are ingested to the Prisma Cloud Enterprise Edition tenant.
• All virtual machines (VMs) have Prisma Cloud Defender deployed.
A)
B)
C)
D)
Which IAM Azure RQL query would correctly generate an output to view users who have sufficient permissions to create security groups within Azure AD and create applications?
On which cloud service providers can new API release information for Prisma Cloud be received?
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
Which three options are selectable in a CI policy for image scanning with Jenkins or twistcli? (Choose three.)