A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other higher level conclusion. They need to pinpoint the area of risk, such as compromised hosts on the network, allows you to assess the risk and take action to prevent exploitation of network resources.
Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes?
Which three features are used to prevent abuse of stolen credentials? (Choose three.)
Prisma SaaS provides which two SaaS threat prevention capabilities? (Choose two)
An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address
Which mechanism prevents this connection from succeeding?
What three Tabs are available in the Detailed Device Health on Panorama for hardware-based firewalls? (Choose three.)
When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)
A Fortune 500 customer has expressed interest in purchasing WildFire; however, they do not want to send discovered malware outside of their network.
Which version of WildFire will meet this customer’s requirements?
When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?
Which selection must be configured on PAN-OS External Dynamic Lists to support MineMeld indicators?
Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)
What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)
Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?
WildFire can discover zero-day malware in which three types of traffic? (Choose three)
What are two benefits of using Panorama for a customer who is deploying virtual firewalls to secure data center traffic? (Choose two.)
What are three considerations when deploying User-ID? (Choose three.)
Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?
Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)
When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?
What two types of certificates are used to configure SSL Forward Proxy? (Сhoose two.)
Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?
What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?
A WildFire subscription is required for which two of the following activities? (Choose two)
An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?
Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)
A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types.
The customer uses a firewall with User-ID enabled
Which feature must also be enabled to prevent these attacks?
Which three script types can be analyzed in WildFire? (Choose three)
Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.
There are different Master Keys on Panorama and managed firewalls.
What is the result if a Panorama Administrator pushes configuration to managed firewalls?
Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)
A client chooses to not block uncategorized websites.
Which two additions should be made to help provide some protection? (Choose two.)
What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?
What is the default behavior in PAN-OS when a 12 MB portable executable (PE) fe is forwarded to the WildFire cloud service?
As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?
Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two.)
Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?
A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.
Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)
An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.
The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)
What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose three)
What helps avoid split brain in active / passive high availability (HA) pair deployment?