How frequently should the related signatures schedule be set?

Palo Alto Networks publishes updated Command-and-Control signatures . How frequently should the related signatures schedule be set?A . Once a dayB . Once a weekC . Once every minuteD . Once an hourView AnswerAnswer: A

July 16, 2022 No Comments READ MORE +

Which functionality is available to firewall users with an active Threat Prevention subscription, but no WildFire license?

Which functionality is available to firewall users with an active Threat Prevention subscription, but no WildFire license?A . WildFire hybrid deploymentB . 5 minute WildFire updates to threat signaturesC . Access to the WildFire APID . PE file upload to WildFireView AnswerAnswer: D

July 15, 2022 No Comments READ MORE +

Which Network Processing Card should be recommended in the Bill of Materials?

A service provider has acquired a pair of PA-7080s for its data center to secure its customer base's traffic. The server provider's traffic is largely generated by smart phones and averages 6.000,000 concurrent sessions. Which Network Processing Card should be recommended in the Bill of Materials?A . PA-7000-20GQ-NPCB . PA-7000-40G-NPCC...

July 15, 2022 No Comments READ MORE +

Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)

Which three items contain information about Command-and-Control (C2) hosts? (Choose three.)A . Threat logsB . WildFire analysis reportsC . Botnet reportsD . Data filtering logsE . SaaS reportsView AnswerAnswer: ABC

July 15, 2022 No Comments READ MORE +

Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?

A customer has business-critical applications that rely on the general web-browsing application . Which security profile can help prevent drive-by-downloads while still allowing web-browsing traffic?A . File Blocking ProfileB . DoS Protection ProfileC . URL Filtering ProfileD . Vulnerability Protection ProfileView AnswerAnswer: A Explanation: Reference: https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwjaw53CvdHyAhUPy4UKHXT5D-MQFnoECAMQAQ&url=https%3A%2F%2Fknowledgebase.paloaltonetworks.com%2Fservlet%2FfileField%3FentityId%3Dka10g000000U0roAAC%26field%3DAttachment_1__Body__s&usg=AOvVaw3DCBM7-FwWInkWYANLrzUt (32)

July 14, 2022 No Comments READ MORE +

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface? A) B) C) D) A . OptionB . OptionC . OptionD . OptionView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/troubleshooting/use-cli-commands-for-sd-wan-tasks.html

July 12, 2022 No Comments READ MORE +

Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes?

A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other higher level...

July 12, 2022 No Comments READ MORE +

Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)

Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)A . Traffic is separated by zonesB . Policy match is based on applicationC . Identification of application is possible on any portD . Traffic control is based on IP...

July 12, 2022 No Comments READ MORE +

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)A . retention requirementsB . Traps agent forensic dataC . the number of Traps agentsD . agent size and OSView AnswerAnswer: AC

July 12, 2022 No Comments READ MORE +

How frequently do WildFire signatures move into the antivirus database?

How frequently do WildFire signatures move into the antivirus database?A . every 24 hoursB . every 12 hoursC . once a weekD . every 1 hourView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/wildfire/9-0/wildfire-admin/wildfire-overview/wildfire-concepts/wildfire-signatures

July 11, 2022 No Comments READ MORE +