Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)
A packet that is already associated with a current session arrives at the firewall.
What is the flow of the packet after the firewall determines that it is matched with an existing session?
Which three features are used to prevent abuse of stolen credentials? (Choose three.)
Which solution informs a customer concerned about zero-day targeted attacks whether an attack is specifically targeted at its property?
Which two features are key in preventing unknown targeted attacks? (Choose two)
What is the basis for purchasing Cortex XDR licensing?
Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)
The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTP decoder for URL filtering is handled by which component in the NGFW?
A company has deployed the following
• VM-300 firewalls in AWS
• endpoint protection with the Traps Management Service
• a Panorama M-200 for managing its VM-Series firewalls
• PA-5220s for its internet perimeter,
• Prisma SaaS for SaaS security.
Which two products can send logs to the Cortex Data Lake? (Choose two).
A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other higher level conclusion. They need to pinpoint the area of risk, such as compromised hosts on the network, allows you to assess the risk and take action to prevent exploitation of network resources.
Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes?
For customers with high bandwidth requirements for Service Connections, what two limitations exist when onboarding multiple Service Connections to the same Prisma Access location servicing a single
Datacenter? (Choose two.)
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
Which two new file types are supported on the WF-500 in PAN-OS 9? (Choose two)
A client chooses to not block uncategorized websites.
Which two additions should be made to help provide some protection? (Choose two.)
Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)
Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)
A customer requires an analytics tool with the following attributes:
- Uses the logs on the firewall to detect actionable events on the network
- Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network
- Pinpoints the area of risk and allows for assessment of the risk to action can be taken to prevent exploitation of network resources
Which feature of PAN-OS will address these requirements?
A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)
How do you configure the rate of file submissions to WildFire in the NGFW?
In which two cases should the Hardware offering of Panorama be chosen over the Virtual Offering? (Choose two.)
As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?
Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)
A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center
Which VM instance should be used to secure the network by this customer?
Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?
What will best enhance security of a production online system while minimizing the impact for the existing network?
What two types of certificates are used to configure SSL Forward Proxy? (Сhoose two.)
Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)
Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?
Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?
A potential customer requires an NGFW solution which enables high-throughput, low-latency network security, all while incorporating unprecedented features and technology. They need a solution that solves the performance problems that plague today's security infrastructure.
Which aspect of the Palo Alto Networks NGFW capabilities can you highlight to help them address the requirements?
When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?
Which selection must be configured on PAN-OS External Dynamic Lists to support MineMeld indicators?
An Administrator needs a PDF summary report that contains information compiled from existing reports based on data for the Top five(5) in each category Which two timeframe options are available to send this report? (Choose two.)
What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?
A Fortune 500 customer has expressed interest in purchasing WildFire; however, they do not want to send discovered malware outside of their network.
Which version of WildFire will meet this customer’s requirements?
Which profile or policy should be applied to protect against port scans from the internet?
In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)
How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?
What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?
How frequently do WildFire signatures move into the antivirus database?
Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)