- All Exams Instant Download
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)A . operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)B . improved revenue due to more efficient network traffic throughputC . Increased security due to scalable...
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?A . Step 4. Create the Zero Trust policy.B . Step 2: Map the transaction flows.C . Step 3. Architect a Zero Trust network.D . Step 1:...
Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?
Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?A . Step 3: Architect a Zero Trust NetworkB . Step 5. Monitor and Maintain the NetworkC . Step 4: Create the Zero Trust PolicyD . Step 1: Define the Protect SurfaceE ....
Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides auto remediation for anomalous user behavior and malicious activity while maintaining user visibility?
Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides auto remediation for anomalous user behavior and malicious activity while maintaining user visibility?A . Dynamic user groups (DUGS)B . tagging groupsC . remote device User-ID groupsD . dynamic address groups (DAGs)View AnswerAnswer: A
Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?
Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?A . User ID and Device-IDB . Source-D and Network.IDC . Source ID and Device-IDD . User-ID and Source-IDView AnswerAnswer: A
WildFire can discover zero-day malware in which three types of traffic? (Choose three)
WildFire can discover zero-day malware in which three types of traffic? (Choose three)A . SMTPB . HTTPSC . FTPD . DNSE . TFTPView AnswerAnswer: A,B,C
What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?
What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?A . allow the request and all subsequent responsesB . temporarily disable the DNS Security functionC . block the queryD . discard...
Which three script types can be analyzed in WildFire? (Choose three)
Which three script types can be analyzed in WildFire? (Choose three)A . PythonScriptB . MonoSenptC . JScriptD . PowerShell ScriptE . VBScriptView AnswerAnswer: A,C,E
How should the site be made available?
Access to a business site is blocked by URL Filtering inline machine learning (ML) and considered as a false-positive. How should the site be made available?A . Disable URL Filtering inline MLB . Create a custom URL category and add it to the Security policyC . Create a custom URL...
A WildFire subscription is required for which two of the following activities? (Choose two)
A WildFire subscription is required for which two of the following activities? (Choose two)A . Filter uniform resource locator (URL) sites by category.B . Forward advanced file types from the firewall for analysis.C . Use the WildFire Application Programming Interface (API) to submit website links for analysisD . Enforce policy...