3 Months Free Update
3 Months Free Update
3 Months Free Update
Which two steps are required to configure the Decryption Broker? (Choose two.)
Access to a business site is blocked by URL Filtering inline machine learning (ML) and
considered as a false-positive.
How should the site be made available?
A customer requires protections and verdicts for portable executable (PE) and executable and linkable format (ELF), as well as the ability to integrate with existing security tools.
Which Cloud-Delivered Security Service (CDSS) does Palo Alto Networks provide that will address this requirement?
A potential customer requires an NGFW solution which enables high-throughput, low-latency network security, all while incorporating unprecedented features and technology. They need a solution that solves the performance problems that plague today's security infrastructure.
Which aspect of the Palo Alto Networks NGFW capabilities can you highlight to help them address the requirements?
Which three features are used to prevent abuse of stolen credentials? (Choose three.)
Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)
Which security profile on the NGFW includes signatures to protect you from brute force attacks?
Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?
There are different Master Keys on Panorama and managed firewalls.
What is the result if a Panorama Administrator pushes configuration to managed firewalls?
A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.
Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)
What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)
An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.
The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)
How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?
Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)
The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTP decoder for URL filtering is handled by which component in the NGFW?
A prospective customer currently uses a firewall that provides only Layer 4
inspection and protections. The customer sees traffic going to an external destination, port 53, but cannot determine what Layer 7 application traffic is going over that port
Which capability of PAN-OS would address the customer's lack of visibility?
In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)
Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?
A)
B)
C)
D)
What is the key benefit of Palo Alto Networks Single Pass Parallel Processing design?
Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.
As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?
Which two network events are highlighted through correlation objects as potential security risks? (Choose two.)
Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)
When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?
What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
What helps avoid split brain in active / passive high availability (HA) pair deployment?
What two types of certificates are used to configure SSL Forward Proxy? (?hoose two.)
Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)
Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)
Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?
A)
B)
C)
D)
What action would address the sub-optimal traffic path shown in the figure?
Key:
RN - Remote Network
SC - Service Connection
MU GW - Mobile User Gateway