Which security profile on the NGFW includes signatures to protect you from brute force attacks?
A. Zone Protection Profile
B. URL Filtering Profile
C. Vulnerability Protection Profile
D. Anti-Spyware Profile
Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)
A. Domain Administrators
B. Enterprise Administrators
C. Distributed COM Users
D. Event Log Readers
E. Server Operator
What is the key benefit of Palo Alto Networks Single Pass Parallel Processing design?
A. There are no benefits other than slight performance upgrades
B. It allows Palo Alto Networks to add new functions to existing hardware
C. Only one processor is needed to complete all the functions within the box
D. It allows Palo Alto Networks to add new devices to existing hardware
Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?
A. >show sdwan path-monitor stats vif
B. >show sdwan session distribution policy-name
C. >show sdwan connection all
D. >show sdwan event
Which three platform components can identify and protect against malicious email links? (Choose three.)
A. WildFire hybrid cloud solution
B. WildFire public cloud
C. WF-500
D. M-200
E. M-600
The firewall includes predefined reports, custom reports can be built for specific data and actionable tasks, or predefined and custom reports can be combined to compile information needed to monitor network security.
The firewall provides which three types of reports? (Choose three.)
A. SNMP Reports
B. PDF Summary Reports
C. Netflow Reports
D. Botnet Reports
E. User or Group Activity Reports
In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)
A. grayware
B. command and control (C2)
C. benign
D. government
E. malware
A company has deployed the following
1.
VM-300 firewalls in AWS
2.
endpoint protection with the Traps Management Service
3.
a Panorama M-200 for managing its VM-Series firewalls
4.
PA-5220s for its internet perimeter,
5.
Prisma SaaS for SaaS security.
Which two products can send logs to the Cortex Data Lake? (Choose two).
A. Prisma SaaS
B. Traps Management Service
C. VM-300 firewalls
D. Panorama M-200 appliance
Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?
A. Option A
B. Option B
C. Option C
D. Option D
For customers with high bandwidth requirements for Service Connections, what two limitations exist when onboarding multiple Service Connections to the same Prisma Access location servicing a single Datacenter? (Choose two.)
A. Network segments in the Datacenter need to be advertised to only one Service Connection
B. The customer edge device needs to support policy-based routing with symmetric return functionality
C. The resources in the Datacenter will only be able to reach remote network resources that share the same region
D. A maximum of four service connections per Datacenter are supported with this topology