لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following are correct statements regarding the use of access keys? (Choose two.)
A. Access keys must have an expiration date
B. Up to two access keys can be active at any time
C. System Admin can create access key for all users
D. Access keys are used for API calls
عرض الإجابة
اجابة صحيحة: BC
السؤال #2
A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)
A. The value of the mined currency exceeds $100
B. High CPU usage over time for the container is detected
C. Common cryptominer process name was found
D. The mined currency is associated with a user token
E. Common cryptominer port usage was found
عرض الإجابة
اجابة صحيحة: CDE
السؤال #3
The Prisma Cloud administrator has configured a new policy. Which steps should be used to assign this policy to a compliance standard?
A. Edit the policy, go to step 3 (Compliance Standards), click + at the bottom, select the compliance standard, fill in the other boxes, and then click Confirm
B. Create the Compliance Standard from Compliance tab, and then select Add to Policy
C. Open the Compliance Standards section of the policy, and then save
D. Custom policies cannot be added to existing standards
عرض الإجابة
اجابة صحيحة: AC
السؤال #4
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
A. policy
B. incident
C. audit
D. anomaly
عرض الإجابة
اجابة صحيحة: B
السؤال #5
Which two attributes of policies can be fetched using API? (Choose two.)
A. policy label
B. policy signature
C. policy mode
D. policy violation
عرض الإجابة
اجابة صحيحة: AD
السؤال #6
Which IAM Azure RQL query would correctly generate an output to view users who have sufficient permissions to create security groups within Azure AD and create applications?
A. config where api
B. config from cloud
C. config from network where api
D. config from cloud
عرض الإجابة
اجابة صحيحة: D
السؤال #7
An administrator sees that a runtime audit has been generated for a Container. The audit message is “DNS resolution of suspicious name wikipedia.com. type A”. Why would this message appear as an audit?
A. The DNS was not learned as part of the Container model or added to the DNS allow list
B. This is a DNS known to be a source of malware
C. The process calling out to this domain was not part of the Container model
D. The Layer7 firewall detected this as anomalous behavior
عرض الإجابة
اجابة صحيحة: A
السؤال #8
An S3 bucket within AWS has generated an alert by violating the Prisma Cloud Default policy `AWS S3 buckets are accessible to public`. The policy definition follows: config where cloud.type = 'aws' AND api.name='aws-s3api-get-bucket-acl' AND json.rule=((((acl.grants[?(@.grantee=='AllUsers')] size > 0) or policyStatus.isPublic is true) and publicAccessBlockConfiguration does not exist) or ((acl.grants[?(@.grantee=='AllUsers')] size > 0) and publicAccessBlockConfiguration.ignorePublicAcis is false) or (policy
A. an event within the cloud account
B. network traffic to the S3 bucket
C. configuration of the S3 bucket
D. anomalous behaviors
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which two required request headers interface with Prisma Cloud API? (Choose two.)
A. Content-type:application/json
B. x-redlock-auth
C. >x-redlock-request-id
D. Content-type:application/xml
عرض الإجابة
اجابة صحيحة: AB
السؤال #10
A security team has been asked to create a custom policy. Which two methods can the team use to accomplish this goal? (Choose two.)
A. add a new policy
B. clone an existing policy
C. disable an out-of-the-box policy
D. edit the query in the out-of-the-box policy
عرض الإجابة
اجابة صحيحة: A
السؤال #11
While writing a custom RQL with array objects in the investigate page, which type of auto-suggestion a user can leverage?
A. Auto-suggestion for array objects that are useful for comparing between arrays
B. Auto-suggestion is not available for array objects
C. Auto-suggestion for array objects that are useful for categorization of resource parameters
D. Auto-suggestion for array objects that are useful for comparing between array elements
عرض الإجابة
اجابة صحيحة: C
السؤال #12
A security team has been asked to create a custom policy.Which two methods can the team use to accomplish this goal? (Choose two.)
A. add a new policy
B. clone an existing policy
C. disable an out-of-the-box policy
D. edit the query in the out-of-the-box policy
عرض الإجابة
اجابة صحيحة: AB
السؤال #13
Which categories does the Adoption Advisor use to measure adoption progress for Cloud Security Posture Management?
A. Visibility, Compliance, Governance, and Threat Detection and Response
B. Network, Anomaly, and Audit Event
C. Visibility, Security, and Compliance
D. Foundations, Advanced, and Optimize
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: