A customer is reviewing Container audits, and an audit has identified a cryptominer attack. Which three options could have generated this audit? (Choose three.)
In the case of identifying a cryptominer attack through container audits, the options that could have generated this audit include B. High CPU usage over time for the container is detected, which is a common indicator of cryptomining activity as it consumes significant computational resources, C. Common cryptominer process name was found, which directly indicates the presence of cryptomining based on known malicious processes, and E. Common cryptominer port usage was found, suggesting cryptomining activity based on network behavior typical of such attacks.
Web-Application and API Security (WAAS) provides protection for which two protocols? (Choose two.)
Web-Application and API Security (WAAS) is a feature within Prisma Cloud that focuses on protecting web applications and APIs from various threats and vulnerabilities. The primary protocols it provides protection for are HTTP (Hypertext Transfer Protocol) and TLS (Transport Layer Security). HTTP is the foundation of data communication for the World Wide Web, and TLS is a cryptographic protocol designed to provide communications security over a computer network. While SSH (Secure Shell) is a protocol for secure remote login and other secure network services, and Tomcat Web Connector via AJP (Apache JServ Protocol) is used for Tomcat server communication, they are not the primary focus of WAAS protection.
Prisma Cloud cannot integrate which of the following secrets managers?
Prisma Cloud integrates with various secret managers to manage sensitive information such as passwords, tokens, and keys. However, it cannot integrate with IBM Secret Manager. The other options, Azure Key Vault, HashiCorp Vault, and AWS Secret Manager, are supported for integration with Prisma Cloud, providing secure storage and handling of secrets.
Which two information types cannot be seen in the data security dashboard? (Choose two).
The data security dashboard in Prisma Cloud provides a comprehensive overview of the security posture related to cloud data storage. However, certain information types, such as the identity of the bucket owner and the actual content within an object, are not typically displayed on such dashboards. This is because the dashboard focuses more on aggregated data profiles, exposure levels, and compliance-related information rather than individual ownership details or the specific content of objects, which may require separate detailed analysis or are managed through different security mechanisms.
A customer wants to be notified about port scanning network activities in their environment. Which policy type detects this behavior?
Mattie
3 days agoRolande
14 days agoMelinda
1 months agoMaile
1 months agoErnie
2 months agoLoren
2 months agoMozell
2 months agoLeontine
3 months agoLakeesha
3 months agoCarey
3 months agoSalina
3 months agoReita
4 months agoWilson
4 months agoJohnna
4 months agoHarris
5 months agoTracey
5 months agoRyan
5 months agoGiuseppe
5 months agoBea
5 months agoFidelia
6 months agoDenae
6 months agoMinna
6 months agoTrinidad
6 months agoEdda
6 months agoMicheline
7 months agoFairy
7 months agoTiera
7 months agoSue
7 months agoEllen
7 months agoJaime
8 months agoKeneth
8 months agoFrancesco
8 months agoJustine
8 months agoJani
9 months agoRosina
10 months agoKate
10 months agoLaurena
11 months ago