Which deployment method is used to integrate a firewall to be inline in an existing network but does not support additional routing or switching?
Which two of the following are ways that Palo Alto Networks CloudDelivered Security Services (CDSS) use confidential information collected from users? (Choose two.)
Select 2 Correct Responses
Which of the following is an appropriate first step for a customer interested in moving to Zero Trust?
Implementation of which PAN-OS feature improves visibility and prevention of malware?
A customer has enabled the Threat Prevention subscription on their Palo Alto Networks Next-Generation Firewall.
How will the performance of the firewall be affected if the customer also enables both WildFire and User-ID?
Which two Cloud-Delivered Security Services (CDSS) would be appropriate for an organization that wants to secure internet traffic on a perimeter firewall? (Choose two.)
Select 2 Correct Responses
Using a comprehensive range of natively-integrated subscriptions and inline machine learning (ML), what does a Next-Generation Firewall (NGFW) use to prevent known and unknown threats in real time?
The ability of a Next-Generation Firewall (NGFW) to logically group physical and virtual interfaces and then control traffic based on that grouping is known as what?
To use App-ID effectively in Security policies, which three best practices should be followed? (Choose three.)
Select 3 Correct Responses
In which two of the following scenarios is personal data excluded from protection under the General Data Protection Regulation (GDPR)?
Select 2 Correct Responses