WildFire can discover zero-day malware in which three types of traffic? (Choose three)
WildFire can discover zero-day malware in which three types of traffic? (Choose three)A . SMTP B. HTTPS C. FTP D. DNS E. TFTPView AnswerAnswer: A,B,C
Which solution informs a customer concerned about zero-day targeted attacks whether an attack is specifically targeted at its property?
Which solution informs a customer concerned about zero-day targeted attacks whether an attack is specifically targeted at its property?A . AutoFocus B. Panorama Correlation Report C. Cortex XSOAR Community edition D. Cortex XDR PreventView AnswerAnswer: A
Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?
Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?A . Prisma SaaS API B. Threat intelligence Cloud C. GlobalProtect D. Cortex XDRView AnswerAnswer: C
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?A . Step 4. Create the Zero Trust policy. B. Step 2: Map the transaction flows. C. Step 3. Architect a Zero Trust network. D. Step 1:...
What will best enhance security of a production online system while minimizing the impact for the existing network?
What will best enhance security of a production online system while minimizing the impact for the existing network?A . Layer 2 interfaces B. active / active high availability (HA) C. Virtual wire D. virtual systemsView AnswerAnswer: C
Which three actions should be taken before deploying a firewall evaluation unt in a customer environment? (Choose three.)
Which three actions should be taken before deploying a firewall evaluation unt in a customer environment? (Choose three.)A . Request that the customer make part 3978 available to allow the evaluation unit to communicate with Panorama B. Inform the customer that a SPAN port must be provided for the evaluation...
Which two of the following does decryption broker provide on a NGFW? (Choose two.)
Which two of the following does decryption broker provide on a NGFW? (Choose two.)A . Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only once B. Eliminates the need for a third party SSL decryption option which allows you to...
How does the platform address the customer’s concern?
A customer worried about unknown attacks is hesitant to enable SSL decryption due to privacy and regulatory issues . How does the platform address the customer’s concern?A . It overcomes reservations about SSL decrypt by offloading to a higher-capacity firewall to help with the decrypt throughput B. It shows how...
How frequently do WildFire signatures move into the antivirus database?
How frequently do WildFire signatures move into the antivirus database?A . every 24 hours B. every 12 hours C. once a week D. every 1 hourView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/wildfire/9-0/wildfire-admin/wildfire-overview/wildfire-concepts/wildfire-signatures
Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)
Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)A . WildFire analysis B. Dynamic user groups (DUGs) C. Multi-factor authentication (MFA) D. URL Filtering ProfilesView AnswerAnswer: C,D