An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?
Which Palo Alto Networks pre-sales tool involves approximately 4 hour interview to discuss a customer's current security posture?
Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?
Which profile or policy should be applied to protect against port scans from the internet?
In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)
A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center
Which VM instance should be used to secure the network by this customer?
A client chooses to not block uncategorized websites.
Which two additions should be made to help provide some protection? (Choose two.)
What are two benefits of using Panorama for a customer who is deploying virtual firewalls to secure data center traffic? (Choose two.)
WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivirus profile and added to the appropriate firewall rules in the profile. In the Palo Alto Networks WildFire test av file, an attempt to download the test file is allowed through.
Which command returns a valid result to verify the ML is working from the command line.
A packet that is already associated with a current session arrives at the firewall.
What is the flow of the packet after the firewall determines that it is matched with an existing session?
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
Which security profile on the NGFW includes signatures to protect you from brute force attacks?
What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)
Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?
Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTP decoder for URL filtering is handled by which component in the NGFW?
Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?
WildFire subscription supports analysis of which three types? (Choose three.)
How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?
Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)
Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides autoremediation for anomalous user behavior and malicious activity while maintaining user visibility?
A company has deployed the following
• VM-300 firewalls in AWS
• endpoint protection with the Traps Management Service
• a Panorama M-200 for managing its VM-Series firewalls
• PA-5220s for its internet perimeter,
• Prisma SaaS for SaaS security.
Which two products can send logs to the Cortex Data Lake? (Choose two).
Access to a business site is blocked by URL Filtering inline machine learning (ML) and
considered as a false-positive.
How should the site be made available?
A Fortune 500 customer has expressed interest in purchasing WildFire; however, they do not want to send discovered malware outside of their network.
Which version of WildFire will meet this customer’s requirements?
Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?
An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.
The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)
Which are the three mandatory components needed to run Cortex XDR? (Choose three.)
A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS).
Which Security profile is used to configure Domain Name Security (DNS) to Identity and block
previously unknown DGA-based threats in real time?
A WildFire subscription is required for which two of the following activities? (Choose two)
When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)
What are two presales selling advantages of using Expedition? (Choose two.)
Which statement applies to Palo Alto Networks Single Pass Parallel Processing (SP3)?
What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)
In which two cases should the Hardware offering of Panorama be chosen over the Virtual Offering? (Choose two.)
Which two steps are required to configure the Decryption Broker? (Choose two.)