Which two features can be enabled to support asymmetric routing with redundancy on a Palo
Alto networks next-generation firewall (NGFW)? (Choose two.)
WildFire subscription supports analysis of which three types? (Choose three.)
Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?
Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)
What two types of certificates are used to configure SSL Forward Proxy? (Сhoose two.)
Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?
The Palo Ao Networks Cloud Identity Engino (CIE) includes which service that supports identity Providers (ldP)?
Which three script types can be analyzed in WildFire? (Choose three)
In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)
How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?
Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?
Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.
A customer is designing a private data center to host their new web application along with a separate headquarters for users.
Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?
Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)
As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?
A packet that is already associated with a current session arrives at the firewall.
What is the flow of the packet after the firewall determines that it is matched with an existing session?
Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?
A)
B)
C)
D)
What are three considerations when deploying User-ID? (Choose three.)
A prospective customer currently uses a firewall that provides only Layer 4
inspection and protections. The customer sees traffic going to an external destination, port 53, but cannot determine what Layer 7 application traffic is going over that port
Which capability of PAN-OS would address the customer's lack of visibility?
Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)
WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivirus profile and added to the appropriate firewall rules in the profile. In the Palo Alto Networks WildFire test av file, an attempt to download the test file is allowed through.
Which command returns a valid result to verify the ML is working from the command line.
A customer has business-critical applications that rely on the general web-browsing application. Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?
What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)
Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)
Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?
A)
B)
C)
D)
Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?
What helps avoid split brain in active / passive high availability (HA) pair deployment?
Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?
Which task would be identified in Best Practice Assessment tool?
Prisma SaaS provides which two SaaS threat prevention capabilities? (Choose two)
An Administrator needs a PDF summary report that contains information compiled from existing reports based on data for the Top five(5) in each category Which two timeframe options are available to send this report? (Choose two.)
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
A customer requests that a known spyware threat signature be triggered based on a rate of occurrence, for example, 10 hits in 5 seconds.
How is this goal accomplished?
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS).
Which Security profile is used to configure Domain Name Security (DNS) to Identity and block
previously unknown DGA-based threats in real time?
Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?
What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}
Which two products can send logs to the Cortex Data Lake? (Choose two.)
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
What will best enhance security of a production online system while minimizing the impact for the existing network?