What is the purpose of Incident Explorer in Prisma Cloud Compute under the "Monitor" section?
A DevOps lead reviewed some system logs and notices some odd behavior that could be a data exfiltration attempt. The DevOps lead only has access to vulnerability data in Prisma Cloud Compute, so the DevOps lead passes this information to SecOps.
Which pages in Prisma Cloud Compute can the SecOps lead use to investigate the runtime aspects of this attack?
Which component(s), if any, will Palo Alto Networks host and run when a customer purchases Prisma Cloud Enterprise Edition?
Which three types of runtime rules can be created? (Choose three.)
What are two ways to scan container images in Jenkins pipelines? (Choose two.)
A customer has a requirement to terminate any Container from image topSecret:latest when a process named ransomWare is executed.
How should the administrator configure Prisma Cloud Compute to satisfy this requirement?
What is an automatically correlated set of individual events generated by the firewall and runtime sensors to identify unfolding attacks?
The compliance team needs to associate Prisma Cloud policies with compliance frameworks. Which option should the team select to perform this task?
An administrator needs to detect and alert on any activities performed by a root account.
Which policy type should be used?
Under which tactic is “Exploit Public-Facing Application” categorized in the ATT&CK framework?