Which license is required to receive weekly dynamic updates to the correlation objects on the firewall and Panorama?

Which license is required to receive weekly dynamic updates to the correlation objects on the firewall and Panorama?
A . WildFire on the firewall, and AutoFocus on Panorama
B . URL Filtering on the firewall, and MindMeld on Panorama
C . Threat Prevention on the firewall, and Support on Panorama
D . GlobalProtect on the firewall, and Threat Prevention on Panorama

Answer: C

Which option is required to activate/retrieve a Device Management License on the M.100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?

Which option is required to activate/retrieve a Device Management License on the M.100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?
A . Generate a Tech Support File and call PANTAC
B . Select Device > Licenses and click activate feature using authorization code
C . Select PANORAMA > Licenses and click Activate feature using authorization code
D . Generate a State Dump File and upload it to the Palo Alto Network support portal

Answer: C

How do Highly Suspicious artifacts in-AutoFocus help identify when an unknown, potential zero-day, targeted attack occur to allow one to adjust the security posture?

How do Highly Suspicious artifacts in-AutoFocus help identify when an unknown, potential zero-day, targeted attack occur to allow one to adjust the security posture?
A . Highly Suspicious artifacts are associated with High-Risk payloads that are inflicting massive amounts of damage to end customers.
B . All High Risk artifacts are automatically classified as Highly Suspicious.
C . Highly Suspicious artifacts are High Risk artifacts that have been seen in very few samples.
D . Highly Suspicious artifacts have been seen infecting a broad, significant range of companies.

Answer: C

How does SSL Forward Proxy decryption work?

How does SSL Forward Proxy decryption work?
A . SSL Forward Proxy decryption policy decrypts and inspects SSL/TLS traffic from internal users to the web.
B . The SSL Forward Proxy Firewall creates a certificate intended for the client that is intercepted and altered by the firewall.
C . If the server’s certificate is signed by a CA that the firewall does not trust, the firewall will use the certificate only on Forward Trust.
D . The firewall resides between the internal client and internal server to intercept traffic between the two.

Answer: A

Which two designs require virtual systems? (Choose two.)

Which two designs require virtual systems? (Choose two.)
A . A shared gateway interface that does not need a full administrative boundary
B . A virtual router as a replacement for an internet-facing router
C . A single physical firewall shared by different organizations, each with unique traffic control needs
D . A VMware NSX deployment that needs micros segmentation

Answer: B,C

What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud? (Choose three.)

What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud? (Choose three.)
A . Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat Alliance
B . Palo Alto Networks AutoFocus generated Correlation Objects
C . Palo Alto Networks Next Generation Firewalls deployed with Wildfire Analysis Security Profiles
D . WF-500 configured as private clouds for privacy concerns
E . Palo Alto Networks non-firewall products, like Traps and Aperture

Answer: A,B,E

Explanation:

https://www.paloaltonetworks.com/products/secure-the-network/subscriptions/autofocus

Which license should an SE recommend to the customer who will be decrypting traffic on the Palo Alto Networks firewall?

Because of regulatory compliance a customer cannot decrypt specific types of traffic.

Which license should an SE recommend to the customer who will be decrypting traffic on the Palo Alto Networks firewall?
A . App-ID, to use applications as match criteria in the decryption policy rules
B . SSL Decryption, for inbound inspection and granular Forward Proxy SSL decryption
C . Support, to request custom categories as match criteria in decryption policy rules
D . URL Filtering, to use predefined URL categories as match criteria in the decryption policy rules

Answer: D

What are three best practices for running an Ultimate Test Drive (UTD)? (Choose three.)

What are three best practices for running an Ultimate Test Drive (UTD)? (Choose three.)
A . It should be used to create pipeline and customer interest.
B . It should be used to demonstrate the power of the platform.
C . The lab documentation should be reviewed and tested.
D . It should be led by Palo Alto Network employees.
E . The required equipment should be shipped to lab site in advance.

Answer: A,B,C