Which two features are key in preventing unknown targeted attacks? (Choose two)
A. nighty botnet report
B. App-ID with the Zero Trust model
C. WildFire Cloud threat analysis
D. Single Pass Parallel Processing (SP3)
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
A. Step 4. Create the Zero Trust policy.
B. Step 2: Map the transaction flows.
C. Step 3. Architect a Zero Trust network.
D. Step 1: Define the protect surface
Which three new script types can be analyzed in WildFire? (Choose three.)
A. VBScript
B. JScript
C. MonoScript
D. PythonScript
E. PowerShell Script
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
A. Enable User Credential Detection
B. Enable User-ID
C. Define a Secure Sockets Layer (SSL) decryption rule base
D. Enable App-ID
E. Define a uniform resource locator (URL) Filtering profile
Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?
A. M-200
B. M-600
C. M-100
D. Panorama VM-Series
There are different Master Keys on Panorama and managed firewalls.
What is the result if a Panorama Administrator pushes configuration to managed firewalls?
A. The push operation will fail regardless of an error or not within the configuration itself
B. Provided there's no error within the configuration to be pushed, the push will succeed
C. The Master Key from the managed firewalls will be overwritten with the Master Key from Panorama
D. There will be a popup to ask if the Master Key from the Panorama should replace the Master Key from the managed firewalls
The firewall includes predefined reports, custom reports can be built for specific data and actionable tasks, or predefined and custom reports can be combined to compile information needed to monitor network security.
The firewall provides which three types of reports? (Choose three.)
A. SNMP Reports
B. PDF Summary Reports
C. Netflow Reports
D. Botnet Reports
E. User or Group Activity Reports
What action would address the sub-optimal traffic path shown in the figure?
Key: RN -Remote Network SC -Service Connection MU GW -Mobile User Gateway
A. Onboard a Service Connection in the Americas region
B. Remove the Service Connection in the EMEA region
C. Onboard a Service Connection in the APAC region
D. Onboard a Remote Network location in the EMEA region
As you prepare to scan your Amazon S3 account, what enables Prisma service permission to access Amazon S3?
A. access key ID
B. secret access key
C. administrative Password
D. AWS account ID
Which statement is true about Deviating Devices and metrics?
A. A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation
B. Deviating Device Tab is only available with a SD-WAN Subscription
C. An Administrator can set the metric health baseline along with a valid standard deviation
D. Deviating Device Tab is only available for hardware-based firewalls