Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?

A.

Create a footnote within the SLR generation tool

B.

Edit the Key-Findings text to list the other types of categories that may be of interest

C.

Remove unwanted categories listed under 'High Risk' and use relevant information

D.

Produce the report and edit the PDF manually

Full Access
Question # 5

Which Palo Alto Networks pre-sales tool involves approximately 4 hour interview to discuss a customer's current security posture?

A.

BPA

B.

PPA

C.

Expedition

D.

SLR

Full Access
Question # 6

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

A.

it requires the Vulnerability Protection profile to be enabled

B.

DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updates

C.

infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be identified in the traffic logs

D.

It requires a Sinkhole license in order to activate

Full Access
Question # 7

Which profile or policy should be applied to protect against port scans from the internet?

A.

Interface management profile on the zone of the ingress interface

B.

Zone protection profile on the zone of the ingress interface

C.

An App-ID security policy rule to block traffic sourcing from the untrust zone

D.

Security profiles to security policy rules for traffic sourcing from the untrust zone

Full Access
Question # 8

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)

A.

SaaS reports

B.

data filtering logs

C.

WildFire analysis reports

D.

threat logs

E.

botnet reports

Full Access
Question # 9

A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center

Which VM instance should be used to secure the network by this customer?

A.

VM-200

B.

VM-100

C.

VM-50

D.

VM-300

Full Access
Question # 10

A client chooses to not block uncategorized websites.

Which two additions should be made to help provide some protection? (Choose two.)

A.

A URL filtering profile with the action set to continue for unknown URL categories to security policy rules that allow web access

B.

A data filtering profile with a custom data pattern to security policy rules that deny uncategorized websites

C.

A file blocking profile attached to security policy rules that allow uncategorized websites to help reduce the risk of drive by downloads

D.

A security policy rule using only known URL categories with the action set to allow

Full Access
Question # 11

What are two benefits of using Panorama for a customer who is deploying virtual firewalls to secure data center traffic? (Choose two.)

A.

It can provide the Automated Correlation Engine functionality, which the virtual firewalls do not support.

B.

It can monitor the virtual firewalls' physical hosts and Vmotion them as necessary

C.

It can automatically create address groups for use with KVM.

D.

It can bootstrap the virtual firewalls for dynamic deployment scenarios.

Full Access
Question # 12

WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivirus profile and added to the appropriate firewall rules in the profile. In the Palo Alto Networks WildFire test av file, an attempt to download the test file is allowed through.

Which command returns a valid result to verify the ML is working from the command line.

A.

show wfml cloud-status

B.

show mlav cloud-status

C.

show ml cloud-status

D.

show av cloud-status

Full Access
Question # 13

A packet that is already associated with a current session arrives at the firewall.

What is the flow of the packet after the firewall determines that it is matched with an existing session?

A.

it is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through a single stream-based content inspection engine before egress.

B.

It is sent through the slow path for further inspection. If subject to content inspection, it will pass through a single stream-based content inspection engines before egress

C.

It is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through multiple content inspection engines before egress

D.

It is sent through the slow path for further inspection. If subject to content inspection, it will pass through multiple content inspection engines before egress

Full Access
Question # 14

Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)

A.

Enable User Credential Detection

B.

Enable User-ID

C.

Define a Secure Sockets Layer (SSL) decryption rule base

D.

Enable App-ID

E.

Define a uniform resource locator (URL) Filtering profile

Full Access
Question # 15

Which security profile on the NGFW includes signatures to protect you from brute force attacks?

A.

Zone Protection Profile

B.

URL Filtering Profile

C.

Vulnerability Protection Profile

D.

Anti-Spyware Profile

Full Access
Question # 16

What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)

A.

when you're delivering a security strategy

B.

when client's want to see the power of the platform

C.

provide users visibility into the applications currently allowed on the network

D.

help streamline the deployment and migration of NGFWs

E.

assess the state of NGFW feature adoption

Full Access
Question # 17

Which Palo Alto Networks security component should an administrator use to and NGFW policies to remote users?

A.

Prisma SaaS API

B.

Threat intelligence Cloud

C.

GlobalProtect

D.

Cortex XDR

Full Access
Question # 18

Which CLI command allows visibility into SD-WAN events such as path Selection and path quality measurements?

A.

>show sdwan path-monitor stats vif

B.

>show sdwan session distribution policy-name

C.

>show sdwan connection all

D.

>show sdwan event

Full Access
Question # 19

in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?

A.

Step 4. Create the Zero Trust policy.

B.

Step 2: Map the transaction flows.

C.

Step 3. Architect a Zero Trust network.

D.

Step 1: Define the protect surface

Full Access
Question # 20

The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, and HTTP decoder for URL filtering is handled by which component in the NGFW?

A.

First Packet Processor

B.

Stream-based Signature Engine

C.

SIA (Scan It All) Processing Engine

D.

Security Processing Engine

Full Access
Question # 21

Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?

A.

M-200

B.

M-600

C.

M-100

D.

Panorama VM-Series

Full Access
Question # 22

WildFire subscription supports analysis of which three types? (Choose three.)

A.

GIF

B.

7-Zip

C.

Flash

D.

RPM

E.

ISO

F.

DMG

Full Access
Question # 23

How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?

A.

Anti-virus (weekly): Application (daily). Threats (weekly), WildFire (5 minutes)

B.

Anti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)

C.

Anti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)

D.

Anti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)

Full Access
Question # 24

Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)

A.

Vulnerability protection

B.

Anti-Spyware

C.

Anti-Virus

D.

Botnet detection

E.

App-ID protection

Full Access
Question # 25

Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides autoremediation for anomalous user behavior and malicious activity while maintaining user visibility?

A.

Dynamic user groups (DUGS)

B.

tagging groups

C.

remote device User-ID groups

D.

dynamic address groups (DAGs)

Full Access
Question # 26

A company has deployed the following

• VM-300 firewalls in AWS

• endpoint protection with the Traps Management Service

• a Panorama M-200 for managing its VM-Series firewalls

• PA-5220s for its internet perimeter,

• Prisma SaaS for SaaS security.

Which two products can send logs to the Cortex Data Lake? (Choose two).

A.

Prisma SaaS

B.

Traps Management Service

C.

VM-300 firewalls

D.

Panorama M-200 appliance

Full Access
Question # 27

Access to a business site is blocked by URL Filtering inline machine learning (ML) and

considered as a false-positive.

How should the site be made available?

A.

Disable URL Filtering inline ML

B.

Create a custom URL category and add it to the Security policy

C.

Create a custom URL category and add it on exception of the inline ML profile

D.

Change the action of real-time detection category on URL filtering profile

Full Access
Question # 28

A Fortune 500 customer has expressed interest in purchasing WildFire; however, they do not want to send discovered malware outside of their network.

Which version of WildFire will meet this customer’s requirements?

A.

WildFire Private Cloud

B.

WildFire Government Cloud

C.

WildFire Secure Cloud

D.

WildFire Public Cloud

Full Access
Question # 29

Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?

A.

Once a day

B.

Once a week

C.

Once every minute

D.

Once an hour

Full Access
Question # 30

An administrator wants to justify the expense of a second Panorama appliance for HA of the management layer.

The customer already has multiple M-100s set up as a log collector group. What are two valid reasons for deploying Panorama in High Availability? (Choose two.)

A.

Control of post rules

B.

Control local firewall rules

C.

Ensure management continuity

D.

Improve log collection redundancy

Full Access
Question # 31

What are three considerations when deploying User-ID? (Choose three.)

A.

Specify included and excluded networks when configuring User-ID

B.

Only enable User-ID on trusted zones

C.

Use a dedicated service account for User-ID services with the minimal permissions necessary

D.

User-ID can support a maximum of 15 hops

E.

Enable WMI probing in high security networks

Full Access
Question # 32

Which are the three mandatory components needed to run Cortex XDR? (Choose three.)

A.

Panorama

B.

NGFW with PANOS 8 0.5 or later

C.

Cortex Data Lake

D.

Traps

E.

Pathfinder

F.

Directory Syn Service

Full Access
Question # 33

A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAS).

Which Security profile is used to configure Domain Name Security (DNS) to Identity and block

previously unknown DGA-based threats in real time?

A.

URL Filtering profile

B.

WildFire Analysis profile

C.

Vulnerability Protection profile

D.

Anti-Spyware profile

Full Access
Question # 34

A WildFire subscription is required for which two of the following activities? (Choose two)

A.

Filter uniform resource locator (URL) sites by category.

B.

Forward advanced file types from the firewall for analysis.

C.

Use the WildFire Application Programming Interface (API) to submit website links for analysis

D.

Enforce policy based on Host Information Profile (HIP)

E.

Decrypt Secure Sockets Layer (SSL)

Full Access
Question # 35

When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)

A.

retention requirements

B.

Traps agent forensic data

C.

the number of Traps agents

D.

agent size and OS

Full Access
Question # 36

What are two presales selling advantages of using Expedition? (Choose two.)

A.

map migration gaps to professional services statement of Works (SOWs)

B.

streamline & migrate to Layer7 policies using Policy Optimizer

C.

reduce effort to implement policies based on App-ID and User-ID

D.

easy migration process to move to Palo Alto Networks NGFWs

Full Access
Question # 37

Which statement applies to Palo Alto Networks Single Pass Parallel Processing (SP3)?

A.

It processes each feature in a separate single pass with additional performance impact for each enabled feature.

B.

Its processing applies only to security features and does not include any networking features.

C.

It processes all traffic in a single pass with no additional performance impact for each enabled feature.

D.

It splits the traffic and processes all security features in a single pass and all network features in a separate pass

Full Access
Question # 38

What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?

A.

allow the request and all subsequent responses

B.

temporarily disable the DNS Security function

C.

block the query

D.

discard the request and all subsequent responses

Full Access
Question # 39

What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)

A.

operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)

B.

improved revenue due to more efficient network traffic throughput

C.

Increased security due to scalable cloud delivered security Services (CDSS)

D.

Cost savings due to reduction in IT management effort and device

Full Access
Question # 40

In which two cases should the Hardware offering of Panorama be chosen over the Virtual Offering? (Choose two.)

A.

Dedicated Logger Mode is required

B.

Logs per second exceed 10,000

C.

Appliance needs to be moved into data center

D.

Device count is under 100

Full Access
Question # 41

Which two steps are required to configure the Decryption Broker? (Choose two.)

A.

reboot the firewall to activate the license

B.

activate the Decryption Broker license

C.

enable SSL Forward Proxy decryption

D.

enable a pair of virtual wire interfaces to forward decrypted traffic

Full Access