Which license is required to receive weekly dynamic updates to the correlation objects on the firewall and Panorama?A . WildFire on the firewall, and AutoFocus on PanoramaB . URL Filtering on the firewall, and MindMeld on PanoramaC . Threat Prevention on the firewall, and Support on PanoramaD . GlobalProtect on the firewall, and Threat...Continue reading
What are the two group options for database when creating a custom report? (Choose two)A . OracleB . SQLC . Detailed LogsD . Summary Databases View Answer Answer: C,D...
Which option is required to activate/retrieve a Device Management License on the M.100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?A . Generate a Tech Support File and call PANTACB . Select Device > Licenses and click activate feature using authorization codeC . Select PANORAMA > Licenses...Continue reading
How do Highly Suspicious artifacts in-AutoFocus help identify when an unknown, potential zero-day, targeted attack occur to allow one to adjust the security posture?A . Highly Suspicious artifacts are associated with High-Risk payloads that are inflicting massive amounts of damage to end customers.B . All High Risk artifacts are automatically classified as Highly Suspicious.C...Continue reading
How does SSL Forward Proxy decryption work?A . SSL Forward Proxy decryption policy decrypts and inspects SSL/TLS traffic from internal users to the web.B . The SSL Forward Proxy Firewall creates a certificate intended for the client that is intercepted and altered by the firewall.C . If the server’s certificate is signed by a...Continue reading
Which two designs require virtual systems? (Choose two.)A . A shared gateway interface that does not need a full administrative boundaryB . A virtual router as a replacement for an internet-facing routerC . A single physical firewall shared by different organizations, each with unique traffic control needsD . A VMware NSX deployment that needs...Continue reading
Which two components must to be configured within User-ID on a new firewall that has been implemented? (Choose two.)A . Group MappingB . 802.1X AuthenticationC . Proxy AuthenticationD . User mapping View Answer Answer: A,D Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id...
What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud? (Choose three.)A . Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat AllianceB . Palo Alto Networks AutoFocus generated Correlation ObjectsC . Palo Alto Networks Next Generation Firewalls deployed with Wildfire Analysis Security ProfilesD ....Continue reading
Because of regulatory compliance a customer cannot decrypt specific types of traffic. Which license should an SE recommend to the customer who will be decrypting traffic on the Palo Alto Networks firewall?A . App-ID, to use applications as match criteria in the decryption policy rulesB . SSL Decryption, for inbound inspection and granular Forward...Continue reading
What are three best practices for running an Ultimate Test Drive (UTD)? (Choose three.)A . It should be used to create pipeline and customer interest.B . It should be used to demonstrate the power of the platform.C . The lab documentation should be reviewed and tested.D . It should be led by Palo Alto...Continue reading