Which license is required to receive weekly dynamic updates to the correlation objects on the firewall and Panorama?

Which license is required to receive weekly dynamic updates to the correlation objects on the firewall and Panorama?A . WildFire on the firewall, and AutoFocus on PanoramaB . URL Filtering on the firewall, and MindMeld on PanoramaC . Threat Prevention on the firewall, and Support on PanoramaD . GlobalProtect on...

January 19, 2021 No Comments READ MORE +

What are the two group options for database when creating a custom report? (Choose two)

What are the two group options for database when creating a custom report? (Choose two)A . OracleB . SQLC . Detailed LogsD . Summary DatabasesView AnswerAnswer: C,D

January 19, 2021 No Comments READ MORE +

Which option is required to activate/retrieve a Device Management License on the M.100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?

Which option is required to activate/retrieve a Device Management License on the M.100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?A . Generate a Tech Support File and call PANTACB . Select Device > Licenses and click activate feature using authorization codeC ....

January 18, 2021 No Comments READ MORE +

How do Highly Suspicious artifacts in-AutoFocus help identify when an unknown, potential zero-day, targeted attack occur to allow one to adjust the security posture?

How do Highly Suspicious artifacts in-AutoFocus help identify when an unknown, potential zero-day, targeted attack occur to allow one to adjust the security posture?A . Highly Suspicious artifacts are associated with High-Risk payloads that are inflicting massive amounts of damage to end customers.B . All High Risk artifacts are automatically...

January 16, 2021 No Comments READ MORE +

How does SSL Forward Proxy decryption work?

How does SSL Forward Proxy decryption work?A . SSL Forward Proxy decryption policy decrypts and inspects SSL/TLS traffic from internal users to the web.B . The SSL Forward Proxy Firewall creates a certificate intended for the client that is intercepted and altered by the firewall.C . If the server's certificate...

January 14, 2021 No Comments READ MORE +

Which two designs require virtual systems? (Choose two.)

Which two designs require virtual systems? (Choose two.)A . A shared gateway interface that does not need a full administrative boundaryB . A virtual router as a replacement for an internet-facing routerC . A single physical firewall shared by different organizations, each with unique traffic control needsD . A VMware...

January 13, 2021 No Comments READ MORE +

Which two components must to be configured within User-ID on a new firewall that has been implemented? (Choose two.)

Which two components must to be configured within User-ID on a new firewall that has been implemented? (Choose two.)A . Group MappingB . 802.1X AuthenticationC . Proxy AuthenticationD . User mappingView AnswerAnswer: A,D Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/user-id/enable-user-id

January 11, 2021 No Comments READ MORE +

What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud? (Choose three.)

What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud? (Choose three.)A . Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat AllianceB . Palo Alto Networks AutoFocus generated Correlation ObjectsC . Palo Alto Networks Next Generation Firewalls deployed with Wildfire...

January 11, 2021 No Comments READ MORE +

Which license should an SE recommend to the customer who will be decrypting traffic on the Palo Alto Networks firewall?

Because of regulatory compliance a customer cannot decrypt specific types of traffic. Which license should an SE recommend to the customer who will be decrypting traffic on the Palo Alto Networks firewall?A . App-ID, to use applications as match criteria in the decryption policy rulesB . SSL Decryption, for inbound...

January 10, 2021 No Comments READ MORE +

What are three best practices for running an Ultimate Test Drive (UTD)? (Choose three.)

What are three best practices for running an Ultimate Test Drive (UTD)? (Choose three.)A . It should be used to create pipeline and customer interest.B . It should be used to demonstrate the power of the platform.C . The lab documentation should be reviewed and tested.D . It should be...

January 10, 2021 No Comments READ MORE +