A security team has been asked to create a custom policy.Which two methods can the team use to accomplish this goal? (Choose two.)
The security auditors need to ensure that given compliance checks are being run on the host.Which option is a valid host compliance policy?
DRAG DROP -Match the correct scanning mode for each given operation.(Select your answer from the pull-down list. Answers may be used more than once or not at all.)Select and Place:
A customer wants to be notified about port scanning network activities in their environment.Which policy type detects this behavior?
A security team is deploying Cloud Native Application Firewall (CNAF) on a containerized web application. The application is running an NGINX container. The container is listening on port 8080 and is mapped to host port 80.Which port should the team specify in the CNAF rule to protect the application?
Given a default deployment of Console, a customer needs to identify the alerted compliance checks that are set by default.Where should the customer navigate in Console?