Which two actions take place after Prisma SD-WAN Instant-On Network (ION) devices have been deployed at a site? (Choose two.)
Which two actions take place after Prisma SD-WAN Instant-On Network (ION) devices have been deployed at a site? (Choose two.)A . The devices continually sync the information from directories, whether they are on-premise, cloud-based, or hybrid. B. The devices establish VPNs over private WAN circuits that share a common service...
Which product draws on data collected through PAN-OS device telemetry to provide an overview of the health of an organization's next-generation firewall (NGFW) deployment and identify areas for improvement?
Which product draws on data collected through PAN-OS device telemetry to provide an overview of the health of an organization's next-generation firewall (NGFW) deployment and identify areas for improvement?A . Cloud Identity Engine (CIE) B. DNS Security C. security information and event management (SIEM) D. Device InsightsView AnswerAnswer: D
Which product leverages GlobalProtect agents for endpoint visibility and native Prisma SD-WAN integration for remote sites and branches?
Which product leverages GlobalProtect agents for endpoint visibility and native Prisma SD-WAN integration for remote sites and branches?A . Cloud-Delivered Security Services (CDSS) B. WildFire C. CloudBlades: D. Autonomous Digital Experience Management (ADEM)View AnswerAnswer: D
Which product enables websites to be rendered in a sandbox environment in order to detect and remove malware and threats before they reach the endpoint?
Which product enables websites to be rendered in a sandbox environment in order to detect and remove malware and threats before they reach the endpoint?A . remote browser isolation B. secure web gateway (SWG) C. network sandbox D. DNS SecurityView AnswerAnswer: A
How can a network engineer export all flow logs and security actions to a security information and event management (SIEM) system?
How can a network engineer export all flow logs and security actions to a security information and event management (SIEM) system?A . Enable syslog on the Instant-On Network (ION) device. B. Use a zone-based firewall to export directly through application program interface (API) to the SIEM. C. Enable Simple Network...
In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?
In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?A . Step 4: Create the Zero Trust policy B. Step 3: Architect a Zero Trust network C. Step 1: Define the protect surface D. Step 5: Monitor and...
Organizations that require remote browser isolation (RBI) to protect their users can automate connectivity to third-party RBI products with which platform?
Organizations that require remote browser isolation (RBI) to protect their users can automate connectivity to third-party RBI products with which platform?A . Zero Trust B. SaaS Security API C. GlobalProtect D. CloudBlades APIView AnswerAnswer: D
The Cortex Data Lake sizing calculator for Prisma Access requires which three values as inputs? (Choose three.)
The Cortex Data Lake sizing calculator for Prisma Access requires which three values as inputs? (Choose three.)A . throughput of remote networks purchased B. cloud-managed or Panorama-managed deployment C. retention period for the logs to be stored D. number of log-forwarding destinations E. number of mobile users purchasedView AnswerAnswer: A,C,E
What is a key benefit of CloudBlades?
What is a key benefit of CloudBlades?A . automation of UI workflow without any code development and deployment of Prisma SD-WAN ION devices B. utilization of near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats C. identification of port-based rules so they can be converted to...
Which statement applies to Prisma Access licensing?
Which statement applies to Prisma Access licensing?A . Internet of Things (IOT) Security is included with each license. B. It provides cloud-based, centralized log storage and aggregation. C. It is a perpetual license required to enable support for multiple virtual systems on PA-3200 Series firewalls. D. For remote network and...