The Cortex Data Lake sizing calculator for Prisma Access requires which three values as inputs? (Choose three.)
The Cortex Data Lake sizing calculator for Prisma Access requires which three values as inputs? (Choose three.)A . throughput of remote networks purchased B. cloud-managed or Panorama-managed deployment C. retention period for the logs to be stored D. number of log-forwarding destinations E. number of mobile users purchasedView AnswerAnswer: A,C,E
Which elements of Autonomous Digital Experience Management (ADEM) help provide end-to-end visibility of everything in an organization's environment?
Which elements of Autonomous Digital Experience Management (ADEM) help provide end-to-end visibility of everything in an organization's environment?A . integrated threat intelligence management, automated distribution to enforcement points at scale, full ticket mirroring B. scanning of all traffic, ports, and protocols C. data collected from endpoint devices, synthetic monitoring tests,...
How does SaaS Security Inline provide a consistent management experience?
How does SaaS Security Inline provide a consistent management experience?A . user credentials required before accessing the resource B. uses advanced predictive analysis and machine learning (ML) C. automatically forwards samples for WildFire analysis D. integrates with existing securityView AnswerAnswer: D
How does the secure access service edge (SASE) security model provide cost savings to organizations?
How does the secure access service edge (SASE) security model provide cost savings to organizations?A . The single platform reduces costs compared to buying and managing multiple point products. B. The compact size of the components involved reduces overhead costs, as less physical space is needed. C. The content inspection...
Which product leverages GlobalProtect agents for endpoint visibility and native Prisma SD-WAN integration for remote sites and branches?
Which product leverages GlobalProtect agents for endpoint visibility and native Prisma SD-WAN integration for remote sites and branches?A . Cloud-Delivered Security Services (CDSS) B. WildFire C. CloudBlades: D. Autonomous Digital Experience Management (ADEM)View AnswerAnswer: A
How can a network engineer export all flow logs and security actions to a security information and event management (SIEM) system?
How can a network engineer export all flow logs and security actions to a security information and event management (SIEM) system?A . Enable syslog on the Instant-On Network (ION) device. B. Use a zone-based firewall to export directly through application program interface (API) to the SIEM. C. Enable Simple Network...
Which product allows advanced Layer 7 inspection, access control, threat detection and prevention?
Which product allows advanced Layer 7 inspection, access control, threat detection and prevention?A . Infrastructure as a Service (IaaS) B. remote browser isolation C. network sandbox D. Firewall as a Service (FWaaS)View AnswerAnswer: D
Which product draws on data collected through PAN-OS device telemetry to provide an overview of the health of an organization's next-generation firewall (NGFW) deployment and identify areas for improvement?
Which product draws on data collected through PAN-OS device telemetry to provide an overview of the health of an organization's next-generation firewall (NGFW) deployment and identify areas for improvement?A . Cloud Identity Engine (CIE) B. DNS Security C. security information and event management (SIEM) D. Device InsightsView AnswerAnswer: D
Which product enables websites to be rendered in a sandbox environment in order to detect and remove malware and threats before they reach the endpoint?
Which product enables websites to be rendered in a sandbox environment in order to detect and remove malware and threats before they reach the endpoint?A . remote browser isolation B. secure web gateway (SWG) C. network sandbox D. DNS SecurityView AnswerAnswer: B
In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?
In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?A . Step 4: Create the Zero Trust policy B. Step 3: Architect a Zero Trust network C. Step 1: Define the protect surface D. Step 5: Monitor and...