Which security profile on the NGFW includes signatures to protect you from brute force attacks?

Which security profile on the NGFW includes signatures to protect you from brute force attacks?A . Zone Protection ProfileB . URL Filtering ProfileC . Vulnerability Protection ProfileD . Anti-Spyware ProfileView AnswerAnswer: C

October 6, 2021 No Comments READ MORE +

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)A . retention requirementsB . Traps agent forensic dataC . the number of Traps agentsD . agent size and OSView AnswerAnswer: B,D

October 6, 2021 No Comments READ MORE +

Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?

A customer has business-critical applications that rely on the general web-browsing application . Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?A . File Blocking ProfileB . DoS Protection ProfileC . URL Filtering ProfileD . Vulnerability Protection ProfileView AnswerAnswer: A Explanation: Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjaw53CvdHyAhUPy4UKHXT5D-MQFnoECAMQAQ&url=https%3A%2F%2Fknowledgebase.paloaltonetworks.com%2Fservlet%2FfileField%3FentityId%3Dka10g000000U0roAAC%26field%3DAttachment_1__Body__s&usg=AOvVaw3DCBM7-FwWInkWYANLrzUt (32)

October 6, 2021 No Comments READ MORE +

Which functionality is available to firewall users with an active Threat Prevention subscription, but no WildFire license?

Which functionality is available to firewall users with an active Threat Prevention subscription, but no WildFire license?A . WildFire hybrid deploymentB . 5 minute WildFire updates to threat signaturesC . Access to the WildFire APID . PE file upload to WildFireView AnswerAnswer: B

October 6, 2021 No Comments READ MORE +

Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.

Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.A . 5500x PAN-GPCS-USER-C-BAS-1YR, 1000x PAN-GPCS-NET-B-BAS-1YR, 1x PAN-LGS-1TB-1YRB ....

October 6, 2021 No Comments READ MORE +

Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)

Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)A . Threat logsB . WildFire analysis reportsC . Botnet reportsD . Data filtering logsE . SaaS reportsView AnswerAnswer: B,C,D

October 5, 2021 No Comments READ MORE +

What are two valid reasons for deploying Panorama in High Availability?

An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer. The customer already has multiple M-100s set up as a log collector group . What are two valid reasons for deploying Panorama in High Availability? (Choose two.)A . Control of post rulesB...

October 5, 2021 No Comments READ MORE +

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface? A) B) C) D) A . OptionB . OptionC . OptionD . OptionView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/troubleshooting/use-cli-commands-for-sd-wan-tasks.html

October 5, 2021 No Comments READ MORE +

Which two features must be enabled to meet the customer’s requirements?

XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy. Which two features must be enabled to meet the customer’s requirements? (Choose two.)A . Virtual systemsB . HA active/activeC . HA active/passiveD . Policy-based forwardingView AnswerAnswer: B,D

October 3, 2021 No Comments READ MORE +

Which two of the following does decryption broker provide on a NGFW? (Choose two.)

Which two of the following does decryption broker provide on a NGFW? (Choose two.)A . Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only onceB . Eliminates the need for a third party SSL decryption option which allows you to...

October 3, 2021 No Comments READ MORE +