<< Prev Question Next Question >>

Question 32/118

A customer wants to scan a serverless function as part of a build process. Which twistcli command can be used to scan serverless functions?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (118q)
Question 1: What are two ways to scan container images in Jenkins pipeli...
Question 2: Match the correct scanning mode for each given operation. (S...
Question 3: Which statement about build and run policies is true?...
Question 4: The administrator wants to review the Console audit logs fro...
Question 5: An administrator wants to install the Defenders to a Kuberne...
Question 6: Given an existing ECS Cluster, which option shows the steps ...
Question 7: Which statement is true about obtaining Console images for P...
Question 8: A customer has a requirement to scan serverless functions fo...
Question 9: Which statement is true regarding CloudFormation templates?...
Question 10: The Prisma Cloud administrator has configured a new policy. ...
Question 11: Which two processes ensure that builds can function after a ...
Question 12: What is the correct method for ensuring key-sensitive data r...
Question 13: What is the order of steps to create a custom network policy...
Question 14: What is the maximum number of access keys a user can generat...
Question 15: Match the correct scanning mode for each given operation. (S...
Question 16: How are the following categorized? * Backdoor account access...
Question 17: Which intensity setting for anomaly alerts is used for the m...
Question 18: You are tasked with configuring a Prisma Cloud build policy ...
Question 19: Which two actions are required in order to use the automated...
Question 20: What must be created in order to receive notifications about...
Question 21: Which two statements apply to the Defender type Container De...
Question 22: While writing a custom RQL with array objects in the investi...
Question 23: Order the steps involved in onboarding an AWS Account for us...
Question 24: A customer finds that an open alert from the previous day ha...
Question 25: Which three actions are required in order to use the automat...
Question 26: Which three elements are part of SSH Events in Host Observat...
Question 27: A customer is interested in PCI requirements and needs to en...
Question 28: Which two fields are required to configure SSO in Prisma Clo...
Question 29: Which component(s), if any, will Palo Alto Networks host and...
Question 30: A customer wants to be notified about port scanning network ...
Question 31: The security team wants to protect a web application contain...
Question 32: A customer wants to scan a serverless function as part of a ...
Question 33: A customer has a development environment with 50 connected D...
Question 34: A customer has a requirement to automatically protect all La...
Question 35: Which option identifies the Prisma Cloud Compute Edition?...
Question 36: Which resource and policy type are used to calculate AWS Net...
Question 37: Which method should be used to authenticate to Prisma Cloud ...
Question 38: Which of the following is displayed in the asset inventory?...
Question 39: An administrator has a requirement to ingest all Console and...
Question 40: What is the order of steps in a Jenkins pipeline scan? (Drag...
Question 41: A security team has a requirement to ensure the environment ...
Question 42: Which options show the steps required to upgrade Console whe...
Question 43: A customer has a requirement to terminate any Container from...
Question 44: What is the order of steps in a Jenkins pipeline scan? (Drag...
Question 45: Which file extension type is supported for Malware scanning ...
Question 46: You have onboarded a public cloud account into Prisma Cloud ...
Question 47: Match the service on the right that evaluates each exposure ...
Question 48: Which two attributes are required for a custom config RQL? (...
Question 49: An administrator has deployed Console into a Kubernetes clus...
Question 50: Which component of a Kubernetes setup can approve, modify, o...
Question 51: A customer has a requirement to terminate any Container from...
Question 52: The development team wants to block Cross Site Scripting att...
Question 53: The Compute Console has recently been upgraded, and the admi...
Question 54: Which type of compliance check is available for rules under ...
Question 55: A security team has been asked to create a custom policy. Wh...
Question 56: A customer does not want alerts to be generated from network...
Question 57: Which two variables must be modified to achieve automatic re...
Question 58: Put the steps involved to configure and scan using the Intel...
Question 59: Which two CI/CD plugins are supported by Prisma Cloud as par...
Question 60: What is the behavior of Defenders when the Console is unreac...
Question 61: What is the default namespace created by Defender DaemonSet ...
Question 62: A customer wants to be notified about port scanning network ...
Question 63: Which two bot types are part of Web Application and API Secu...
Question 64: An administrator has been tasked with a requirement by your ...
Question 65: Which three serverless runtimes are supported by Prisma Clou...
Question 66: A customer has a large environment that needs to upgrade Con...
Question 67: The development team wants to block Cross Site Scripting att...
Question 68: Which options show the steps required after upgrade of Conso...
Question 69: Which three types of classifications are available in the Da...
Question 70: Which statement is true regarding CloudFormation templates?...
Question 71: What will happen when a Prisma Cloud Administrator has confi...
Question 72: Review this admission control policy: (Exhibit) Which respon...
Question 73: An administrator has deployed Console into a Kubernetes clus...
Question 74: The development team wants to fail CI jobs where a specific ...
Question 75: An administrator needs to detect and alert on any activities...
Question 76: What is the function of the external ID when onboarding a ne...
Question 77: Which two attributes of policies can be fetched using API? (...
Question 78: You wish to create a custom policy with build and run subtyp...
Question 79: Which statement accurately characterizes SSO Integration on ...
Question 80: You wish to create a custom policy with build and run subtyp...
Question 81: Which statement is true about obtaining Console images for P...
Question 82: A business unit has acquired a company that has a very large...
Question 83: Order the steps involved in onboarding an AWS Account for us...
Question 84: An administrator has been tasked with creating a custom serv...
Question 85: Which three fields are mandatory when authenticating the Pri...
Question 86: The development team is building pods to host a web front en...
Question 87: Which two bot categories belong to unknown bots under Web-Ap...
Question 88: Which policy type in Prisma Cloud can protect against malwar...
Question 89: An administrator has been tasked with creating a custom serv...
Question 90: An administrator needs to write a script that automatically ...
Question 91: What is an automatically correlated set of individual events...
Question 92: A customer is interested in PCI requirements and needs to en...
Question 93: What is an example of an outbound notification within Prisma...
Question 94: A S3 bucket within AWS has generated an alert by violating t...
Question 95: A customer has serverless functions that are deployed in mul...
Question 96: Given the following JSON query: $.resource[*].aws_s3_bucket ...
Question 97: A customer has a requirement to terminate any Container from...
Question 98: A customer has configured the JIT, and the user created by t...
Question 99: The Unusual protocol activity (Internal) network anomaly is ...
Question 100: Web-Application and API Security (WAAS) provides protection ...
Question 101: Per security requirements, an administrator needs to provide...
Question 102: Which statement is true about obtaining Console images for P...
Question 103: A customer is reviewing Container audits, and an audit has i...
Question 104: A Prisma Cloud administrator is tasked with pulling a report...
Question 105: Which intensity setting for anomaly alerts is used for the m...
Question 106: What happens when a role is deleted in Prisma Cloud?...
Question 107: An administrator sees that a runtime audit has been generate...
Question 108: A security team has been asked to create a custom policy. Wh...
Question 109: A customer does not want alerts to be generated from network...
Question 110: A customer wants to harden its environment from misconfigura...
Question 111: A customer wants to monitor the company's AWS accounts via P...
Question 112: Which options show the steps required after upgrade of Conso...
Question 113: Which two of the following are required to be entered on the...
Question 114: Which statement about build and run policies is true?...
Question 115: A customer is deploying Defenders to a Fargate environment. ...
Question 116: Match the correct scanning mode for each given operation. (S...
Question 117: Which authentication mechanism is supported by Prisma Cloud?...
Question 118: What is the order of steps in a Jenkins pipeline scan? (Drag...