Which version of WildFire will meet this customer’s requirements?

A Fortune 500 customer has expressed interest in purchasing WildFire; however, they do not want to send discovered malware outside of their network. Which version of WildFire will meet this customer’s requirements?A . WildFire Private Cloud B. WildFire Government Cloud C. WildFire Secure Cloud D. WildFire Public CloudView AnswerAnswer: A

September 20, 2022 No Comments READ MORE +

Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?

Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?A . User ID and Device-ID B. Source-D and Network.ID C. Source ID and Device-ID D. User-ID and Source-IDView AnswerAnswer: A

September 19, 2022 No Comments READ MORE +

Which statement best describes the business value of Palo Alto Networks Zero Touch Provisioning (ZTP)?

Which statement best describes the business value of Palo Alto Networks Zero Touch Provisioning (ZTP)?A . It is designed to simplify and automate the onboarding of new firewalls to the Panorama management server. B. When it is in place, it removes the need for an onsite firewall C. When the...

September 18, 2022 No Comments READ MORE +

What are two steps in this process?

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture. What are two steps in this process? (Choose two.)A . Validate user identities through authentication B. Gain visibility of and control over applications and functionality in the traffic flow using...

September 18, 2022 No Comments READ MORE +

Which three mechanisms are valid for enabling user mapping? (Choose three.)

Which three mechanisms are valid for enabling user mapping? (Choose three.)A . Captive Portal B. Domain server monitoring C. Reverse DNS lookup D. User behaviour recognition E. Client probingView AnswerAnswer: A,B,E

September 18, 2022 No Comments READ MORE +

Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?

Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?A . M-600 appliance B. Panorama Interconnect plugin C. Panorama Large Scale VPN (LSVPN) plugin D. Palo Alto Networks Cluster licenseView AnswerAnswer: B

September 18, 2022 No Comments READ MORE +

What are two benefits of the sinkhole Internet Protocol (IP) address that DNS Security sends to the client in place of malicious IP addresses? (Choose two.)

What are two benefits of the sinkhole Internet Protocol (IP) address that DNS Security sends to the client in place of malicious IP addresses? (Choose two.)A . The client communicates with it instead of the malicious IP address B. It represents the remediation server that the client should visit for...

September 17, 2022 No Comments READ MORE +

A WildFire subscription is required for which two of the following activities? (Choose two)

A WildFire subscription is required for which two of the following activities? (Choose two)A . Filter uniform resource locator (URL) sites by category. B. Forward advanced file types from the firewall for analysis. C. Use the WildFire Application Programming Interface (API) to submit website links for analysis D. Enforce policy...

September 17, 2022 No Comments READ MORE +

Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?

Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?A . >show sdwan path-monitor stats vif B. >show sdwan session distribution policy-name C. >show sdwan connection all D. >show sdwan eventView AnswerAnswer: D

September 16, 2022 No Comments READ MORE +

Which two methods are used to check for Corporate Credential Submissions? (Choose two.)

Which two methods are used to check for Corporate Credential Submissions? (Choose two.)A . doman credentialiter B. User-ID credential check C. LDAP query D. IP user mappingView AnswerAnswer: A,B

September 16, 2022 No Comments READ MORE +