لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Match the service on the right that evaluates each exposure type on the left. (Select your answer from the pull-down list. Answers may be used more than once or not at all.)
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: B
السؤال #2
An administrator sees that a runtime audit has been generated for a host. The audit message is: “Service postfix attempted to obtain capability SHELL by executing /bin/sh /usr/libexec/postfix/postfix- script.stop. Low severity audit, event is automatically added to the runtime model” Which runtime host policy rule is the root cause for this runtime audit?
A. Custom rule with specific configuration for file integrity
B. Custom rule with specific configuration for networking
C. Default rule that alerts on capabilities
D. Default rule that alerts on suspicious runtime behavior
عرض الإجابة
اجابة صحيحة: D
السؤال #3
A customer has a large environment that needs to upgrade Console without upgrading all Defenders at one time. What are two prerequisites prior to performing a rolling upgrade of Defenders? (Choose two.)
A. manual installation of the latest twistcli tool prior to the rolling upgrade
B. all Defenders set in read-only mode before execution of the rolling upgrade
C. a second location where you can install the Console
D. additional workload licenses are required to perform the rolling upgrade
E. an existing Console at version n-1
عرض الإجابة
اجابة صحيحة: BE
السؤال #4
The security auditors need to ensure that given compliance checks are being run on the host. Which option is a valid host compliance policy?
A. Ensure functions are not overly permissive
B. Ensure host devices are not directly exposed to containers
C. Ensure images are created with a non-root user
D. Ensure compliant Docker daemon configuration
عرض الإجابة
اجابة صحيحة: AB
السؤال #5
What is the behavior of Defenders when the Console is unreachable during upgrades?
A. Defenders continue to alert, but not enforce, using the policies and settings most recently cached before upgrading the Console
B. Defenders will fail closed until the web-socket can be re-established
C. Defenders will fail open until the web-socket can be re-established
D. Defenders continue to alert and enforce using the policies and settings most recently cached before upgrading the Console
عرض الإجابة
اجابة صحيحة: D
السؤال #6
Which step is included when configuring Kubernetes to use Prisma Cloud Compute as an admission controller?
A. copy the Console address and set the config map for the default namespace
B. create a new namespace in Kubernetes called admission-controller
C. enable Kubernetes auditing from the Defend > Access > Kubernetes page in the Console
D. copy the admission controller configuration from the Console and apply it to Kubernetes
عرض الإجابة
اجابة صحيحة: B
السؤال #7
How are the following categorized? Backdoor account access Hijacked processes Lateral movement Port scanning
A. audits
B. incidents
C. admission controllers
D. models
عرض الإجابة
اجابة صحيحة: B
السؤال #8
Which order of steps map a policy to a custom compliance standard? (Drag the steps into the correct order of occurrence, from the first step to the last.)
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #9
The security team wants to target a CNAF policy for specific running Containers. How should the administrator scope the policy to target the Containers?
A. scope the policy to Image names
B. scope the policy to namespaces
C. scope the policy to Defender names
D. scope the policy to Host names
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which intensity setting for anomaly alerts is used for the measurement of 100 events over 30 days?
A. High
B. Medium
C. Low
D. Very High
عرض الإجابة
اجابة صحيحة: A
السؤال #11
Which statement is true regarding CloudFormation templates?
A. Scan support does not currently exist for nested references, macros, or intrinsic functions
B. A single template or a zip archive of template files cannot be scanned with a single API request
C. Request-Header-Field ‘cloudformation-version’ is required to request a scan
D. Scan support is provided for JSON, HTML and YAML formats
عرض الإجابة
اجابة صحيحة: A
السؤال #12
An administrator has been tasked with creating a custom service that will download any existing compliance report from a Prisma Cloud Enterprise tenant. In which order will the APIs be executed for this service? (Drag the steps into the correct order of occurrence, from the first step to the last.)
A. Mastered
B. Not Mastered
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which two processes ensure that builds can function after a Console upgrade? (Choose two.)
A. allowing Jenkins to automatically update the plugin
B. updating any build environments that have twistcli included to use the latest version
C. configuring build pipelines to download twistcli at the start of each build
D. creating a new policy that allows older versions of twistcli to connect the Console
عرض الإجابة
اجابة صحيحة: D
السؤال #14
An administrator has deployed Console into a Kubernetes cluster running in AWS. The administrator also has configured a load balancer in TCP passthrough mode to listen on the same ports as the default Prisma Compute Console configuration. In the build pipeline, the administrator wants twistcli to talk to Console over HTTPS. Which port will twistcli need to use to access the Prisma Compute APIs?
A. 8084
B. 443
C. 8083
D. 8081
عرض الإجابة
اجابة صحيحة: A
السؤال #15
Which method should be used to authenticate to Prisma Cloud Enterprise programmatically?
A. single sign-on
B. SAML
C. basic authentication
D. access key
عرض الإجابة
اجابة صحيحة: A
السؤال #16
A customer wants to harden its environment from misconfiguration. Prisma Cloud Compute Compliance enforcement for hosts covers which three options? (Choose three.)
A. Docker daemon configuration files
B. Docker daemon configuration
C. Host cloud provider tags
D. Host configuration
E. Hosts without Defender agents
عرض الإجابة
اجابة صحيحة: BCD

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: