Which statement best describes the business value of Palo Alto Networks Zero Touch Provisioning (ZTP)?
Which statement best describes the business value of Palo Alto Networks Zero Touch Provisioning (ZTP)?A . It is designed to simplify and automate the onboarding of new firewalls to the Panorama management server.B . When it is in place, it removes the need for an onsite firewallC . When the...
What helps avoid split brain in active / passive high availability (HA) pair deployment?
What helps avoid split brain in active / passive high availability (HA) pair deployment?A . Enable preemption on both firewalls in the HA pair.B . Use a standard traffic interface as the HA3 link.C . Use the management interface as the HA1 backup linkD . Use a standard traffic interface...
Which Security profile is used to configure Domain Name Security (DNS) to Identity and block previously unknown DGA-based threats in real time?
A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS). Which Security profile is used to configure Domain Name Security (DNS) to Identity and block previously unknown DGA-based threats in real time?A . URL Filtering profileB . WildFire Analysis profileC...
Which version of WildFire will meet this customer’s requirements?
A Fortune 500 customer has expressed interest in purchasing WildFire; however, they do not want to send discovered malware outside of their network. Which version of WildFire will meet this customer’s requirements?A . WildFire Private CloudB . WildFire Government CloudC . WildFire Secure CloudD . WildFire Public CloudView AnswerAnswer: A
Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?
Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?A . Vulnerability Protection profileB . Antivirus profileC . URL Filtering profileD . Anti-Spyware profileView AnswerAnswer: A
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)A . operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)B . improved revenue due to more efficient network traffic throughputC . Increased security due to scalable...
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?A . Step 4. Create the Zero Trust policy.B . Step 2: Map the transaction flows.C . Step 3. Architect a Zero Trust network.D . Step 1:...
Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?
Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?A . Step 3: Architect a Zero Trust NetworkB . Step 5. Monitor and Maintain the NetworkC . Step 4: Create the Zero Trust PolicyD . Step 1: Define the Protect SurfaceE ....
Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides auto remediation for anomalous user behavior and malicious activity while maintaining user visibility?
Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides auto remediation for anomalous user behavior and malicious activity while maintaining user visibility?A . Dynamic user groups (DUGS)B . tagging groupsC . remote device User-ID groupsD . dynamic address groups (DAGs)View AnswerAnswer: A
Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?
Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?A . User ID and Device-IDB . Source-D and Network.IDC . Source ID and Device-IDD . User-ID and Source-IDView AnswerAnswer: A