Which two information types cannot be seen in the data security dashboard? (Choose two).
If you are required to run in an air-gapped environment, which product should you install?
Which of the following are correct statements regarding the use of access keys? (Choose two.)
What is the function of the external ID when onboarding a new Amazon Web Services (AWS) account in Prisma Cloud?
Which two IDE plugins are supported by Prisma Cloud as part of its DevOps Security? (Choose two.)
Which three public cloud providers are supported for VM image scanning? (Choose three.)
Based on the following information, which RQL query will satisfy the requirement to identify VM hosts deployed to organization public cloud environments exposed to network traffic from the internet and affected by Text4Shell RCE (CVE-2022-42889) vulnerability?
• Network flow logs from all virtual private cloud (VPC) subnets are ingested to the Prisma Cloud Enterprise Edition tenant.
• All virtual machines (VMs) have Prisma Cloud Defender deployed.
A)
B)
C)
D)