Which two actions take place after Prisma SD-WAN Instant-On Network (ION) devices have been deployed at a site? (Choose two.)

Which two actions take place after Prisma SD-WAN Instant-On Network (ION) devices have been deployed at a site? (Choose two.)A . The devices continually sync the information from directories, whether they are on-premise, cloud-based, or hybrid. B. The devices establish VPNs over private WAN circuits that share a common service...

July 31, 2023 No Comments READ MORE +

Which product draws on data collected through PAN-OS device telemetry to provide an overview of the health of an organization's next-generation firewall (NGFW) deployment and identify areas for improvement?

Which product draws on data collected through PAN-OS device telemetry to provide an overview of the health of an organization's next-generation firewall (NGFW) deployment and identify areas for improvement?A . Cloud Identity Engine (CIE) B. DNS Security C. security information and event management (SIEM) D. Device InsightsView AnswerAnswer: D

July 28, 2023 No Comments READ MORE +

Which product leverages GlobalProtect agents for endpoint visibility and native Prisma SD-WAN integration for remote sites and branches?

Which product leverages GlobalProtect agents for endpoint visibility and native Prisma SD-WAN integration for remote sites and branches?A . Cloud-Delivered Security Services (CDSS) B. WildFire C. CloudBlades: D. Autonomous Digital Experience Management (ADEM)View AnswerAnswer: D

July 28, 2023 No Comments READ MORE +

Which product enables websites to be rendered in a sandbox environment in order to detect and remove malware and threats before they reach the endpoint?

Which product enables websites to be rendered in a sandbox environment in order to detect and remove malware and threats before they reach the endpoint?A . remote browser isolation B. secure web gateway (SWG) C. network sandbox D. DNS SecurityView AnswerAnswer: A

July 28, 2023 No Comments READ MORE +

How can a network engineer export all flow logs and security actions to a security information and event management (SIEM) system?

How can a network engineer export all flow logs and security actions to a security information and event management (SIEM) system?A . Enable syslog on the Instant-On Network (ION) device. B. Use a zone-based firewall to export directly through application program interface (API) to the SIEM. C. Enable Simple Network...

July 28, 2023 No Comments READ MORE +

In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?

In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?A . Step 4: Create the Zero Trust policy B. Step 3: Architect a Zero Trust network C. Step 1: Define the protect surface D. Step 5: Monitor and...

July 27, 2023 No Comments READ MORE +

Organizations that require remote browser isolation (RBI) to protect their users can automate connectivity to third-party RBI products with which platform?

Organizations that require remote browser isolation (RBI) to protect their users can automate connectivity to third-party RBI products with which platform?A . Zero Trust B. SaaS Security API C. GlobalProtect D. CloudBlades APIView AnswerAnswer: D

July 27, 2023 No Comments READ MORE +

The Cortex Data Lake sizing calculator for Prisma Access requires which three values as inputs? (Choose three.)

The Cortex Data Lake sizing calculator for Prisma Access requires which three values as inputs? (Choose three.)A . throughput of remote networks purchased B. cloud-managed or Panorama-managed deployment C. retention period for the logs to be stored D. number of log-forwarding destinations E. number of mobile users purchasedView AnswerAnswer: A,C,E

July 27, 2023 No Comments READ MORE +

What is a key benefit of CloudBlades?

What is a key benefit of CloudBlades?A . automation of UI workflow without any code development and deployment of Prisma SD-WAN ION devices B. utilization of near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats C. identification of port-based rules so they can be converted to...

July 26, 2023 No Comments READ MORE +

Which statement applies to Prisma Access licensing?

Which statement applies to Prisma Access licensing?A . Internet of Things (IOT) Security is included with each license. B. It provides cloud-based, centralized log storage and aggregation. C. It is a perpetual license required to enable support for multiple virtual systems on PA-3200 Series firewalls. D. For remote network and...

July 4, 2023 No Comments READ MORE +