How can a network engineer export all flow logs and security actions to a security information and event management (SIEM) system?
A. Enable syslog on the Instant-On Network (ION) device.
B. Use a zone-based firewall to export directly through application program interface (API) to the SIEM.
C. Enable Simple Network Management Protocol (SNMP) on the Instant-On Network (ION) device.
D. Use the centralized flow data-export tool built into the controller.
Which statement applies to Prisma Access licensing?
A. Internet of Things (IOT) Security is included with each license.
B. It provides cloud-based, centralized log storage and aggregation.
C. It is a perpetual license required to enable support for multiple virtual systems on PA- 3200 Series firewalls.
D. For remote network and Clean Pipe deployments, a unit is defined as 1 Mbps of bandwidth.
What is a key benefit of CloudBlades?
A. automation of UI workflow without any code development and deployment of Prisma SD-WAN ION devices
B. utilization of near real-time analysis to detect previously unseen, targeted malware and advanced persistent threats
C. identification of port-based rules so they can be converted to application-based rules without compromising application availability
D. configuration of the authentication source once instead of for each authentication method used
How does SaaS Security Inline provide a consistent management experience?
A. user credentials required before accessing the resource
B. uses advanced predictive analysis and machine learning (ML)
C. automatically forwards samples for WildFire analysis
D. integrates with existing security
Which product enables organizations to open unknown files in a sandbox environment and scan them for malware or other threats?
A. network sandbox
B. SD-WAN
C. cloud access security broker (CASB)
D. remote browser isolation
Which App Response Time metric measures the amount of time it takes to transfer incoming data from an external server to a local client?
A. UDP Response Time (UDP-TRT)
B. Server Response Time (SRT)
C. Network Transfer Time (NTTn)
D. Round Trip Time (RTT)
What is feature of Autonomous Digital Experience Management (ADEM)?
A. It applies configuration changes and provides credential management, role-based controls, and a playbook repository.
B. It provides customized forms to collect and validate necessary parameters from the requester.
C. It natively ingests, normalizes, and integrates granular data across the security infrastructure at nearly half the cost of legacy security products attempting to solve the problem.
D. It provides IT teams with single-pane visibility that leverages endpoint, simulated, and real-time user traffic data to provide the most complete picture of user traffic flows possible.
Which connection method allows secure web gateway (SWG) access to internet-based SaaS applications using HTTP and HTTPS protocols?
A. GlobalProtect
B. Broker VM
C. explicit proxy
D. system-wide proxy
How does the Palo Alto Networks secure access service edge (SASE) solution enable Zero Trust in a customer environment?
A. It stops attacks that use DNS for command and control or data theft.
B. It feeds threat intelligence into an automation engine for rapid and consistent protections.
C. It classifies sites based on content, features, and safety.
D. It continuously validates every stage of a digital interaction.
Which App Response Time metric is the measure of network latency?
A. Round Trip Time (RTT)
B. Server Response Time (SRT)
C. Network Transfer Time (NTTn)
D. UDP Response Time (UDP-TRT)