New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Palo Alto Networks PSE-PrismaCloud Exam - Topic 9 Question 70 Discussion

Actual exam question for Palo Alto Networks's PSE-PrismaCloud exam
Question #: 70
Topic #: 9
[All PSE-PrismaCloud Questions]

How can you use Prisma Public Cloud to identify Amazon EC2 instances that have been tagged as "Private?

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Vonda
3 months ago
Totally agree with A, it's straightforward and precise!
upvoted 0 times
...
Aja
3 months ago
Wait, can you really find them with D? That sounds odd.
upvoted 0 times
...
Stephane
3 months ago
B seems a bit off, it's not just about traffic.
upvoted 0 times
...
Melissa
4 months ago
I think C is easier, just filter the dashboard.
upvoted 0 times
...
Claribel
4 months ago
A is the way to go! RQL config queries are super effective.
upvoted 0 times
...
Doyle
4 months ago
I vaguely recall something about RQL queries being essential for tagging, so option A might be the right choice, but I need to double-check that.
upvoted 0 times
...
Hannah
4 months ago
I feel like the CIS compliance report could be useful, but it doesn't seem directly related to just identifying instances with the 'Private' tag.
upvoted 0 times
...
Antione
4 months ago
I remember practicing with the Asset Dashboard, and filtering by tags seems like a straightforward approach. That might be the answer.
upvoted 0 times
...
Ressie
5 months ago
I think we might need to use RQL for this, but I'm not entirely sure if it's the config query or the network query that we need.
upvoted 0 times
...
Jenelle
5 months ago
A compliance report might give me some additional context, but I'm not sure it's the most direct way to answer this question. I'll focus on the RQL and Asset Dashboard options.
upvoted 0 times
...
Nada
5 months ago
The Asset Dashboard option seems like the easiest way to filter and find the tagged resources. I'll try that first.
upvoted 0 times
...
Francisca
5 months ago
Hmm, I'm not sure if the RQL network query is the right approach here. I'll need to double-check the details on how to use that.
upvoted 0 times
...
Leontine
5 months ago
This looks straightforward - I think I can use the RQL config query to find the resources with the 'Private' tag.
upvoted 0 times
...
Huey
5 months ago
Okay, I think I know the answer here. Adding a startup probe seems like the best way to handle this issue.
upvoted 0 times
...
Lanie
5 months ago
I vaguely recall that not all remaining steps are suitable for encapsulation, which makes me lean towards false. But I'm not confident about it!
upvoted 0 times
...
Ellsworth
5 months ago
I remember practicing a question similar to this, and I thought external databases might handle that automatically, but I could be mixing it up.
upvoted 0 times
...
Derrick
5 months ago
I feel pretty confident that the answer is D, the SSID. Changing the network name is a common recommendation to improve security, especially after a break-in. The other options just don't seem as relevant to the specific situation described in the question.
upvoted 0 times
...

Save Cancel