Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

Which statement applies to the default configuration of a Palo Alto Networks NGFW?

A.

Security profiles are applied to all policies by default, eliminating implicit trust of any data traversing the firewall.

B.

The default policy action for intrazone traffic is deny, eliminating implicit trust within a security zone.

C.

The default policy action allows all traffic unless explicitly denied.

D.

The default policy action for interzone traffic is deny, eliminating implicit trust between security zones.

Full Access
Question # 5

According to a customer’s CIO, who is upgrading PAN-OS versions, “Finding issues and then engaging with your support people requires expertise that our operations team can better utilize elsewhere on more valuable tasks for the business.” The upgrade project was initiated in a rush because the company did not have the appropriate tools to indicate that their current NGFWs were reaching capacity.

Which two actions by the Palo Alto Networks team offer a long-term solution for the customer? (Choose two.)

A.

Recommend that the operations team use the free machine learning-powered AIOps for NGFW tool.

B.

Suggest the inclusion of training into the proposal so that the operations team is informed andconfident in working on their firewalls.

C.

Inform the CIO that the new enhanced security features they will gain from the PAN-OS upgrades will fix any future problems with upgrading and capacity.

D.

Propose AIOps Premium within Strata Cloud Manager (SCM) to address the company’s issues from within the existing technology.

Full Access
Question # 6

Which two actions can a systems engineer take to discover how Palo Alto Networks can bring value to a customer's business when they show interest in adopting Zero Trust? (Choose two.)

A.

Ask the customer about their internal business flows, such as how their users interact with applications and data across the infrastructure.

B.

Explain how Palo Alto Networks can place virtual NGFWs across the customer's network to ensure assets and traffic are seen and controlled.

C.

Use the Zero Trust Roadshow package to demonstrate to the customer how robust Palo Alto Networks capabilities are in meeting Zero Trust.

D.

Ask the customer about their approach to Zero Trust, explaining that it is a strategy more than it is something they purchase.

Full Access
Question # 7

What are the first two steps a customer should perform as they begin to understand and adopt Zero Trust principles? (Choose two)

A.

Understand which users, devices, infrastructure, applications, data, and services are part of the network or have access to it.

B.

Enable relevant Cloud-Delivered Security Services (CDSS) subscriptions to automatically protect the customer's environment from both internal and external threats.

C.

Map the transactions between users, applications, and data, then verify and inspect those transactions.

D.

Implement VM-Series NGFWs in the customer’s public and private clouds to protect east-west traffic.

Full Access
Question # 8

The PAN-OS User-ID integrated agent is included with PAN-OS software and comes in which two forms? (Choose two.)

A.

Integrated agent

B.

GlobalProtect agent

C.

Windows-based agent

D.

Cloud Identity Engine (CIE)

Full Access
Question # 9

When a customer needs to understand how Palo Alto Networks NGFWs lower the risk of exploitation by newly announced vulnerabilities known to be actively attacked, which solution and functionality delivers the most value?

A.

Advanced URL Filtering uses machine learning (ML) to learn which malicious URLs are being utilized by the attackers, then block the resulting traffic.

B.

Advanced Threat Prevention's command injection and SQL injection functions use inline deep learning against zero-day threats.

C.

Single Pass Architecture and parallel processing ensure traffic is efficiently scanned against any enabled Cloud-Delivered Security Services (CDSS) subscription.

D.

WildFire loads custom OS images to ensure that the sandboxing catches any activity that would affect the customer's environment.

Full Access
Question # 10

There are no Advanced Threat Prevention log events in a company's SIEM instance. However, the systems administrator has confirmed that the Advanced Threat Prevention subscription is licensed and that threat events are visible in the threat logs on the firewall.

Which action should the systems administrator take next?

A.

Enable the company's Threat Prevention license.

B.

Check with the SIEM vendor to verify that Advanced Threat Prevention logs are reaching the company's SIEM instance.

C.

Have the SIEM vendor troubleshoot its software.

D.

Ensure the Security policy rules that use Advanced Threat Prevention are set for log forwarding to the correct SIEM.

Full Access
Question # 11

Which three descriptions apply to a perimeter firewall? (Choose three.)

A.

Network layer protection for the outer edge of a network

B.

Power utilization less than 500 watts sustained

C.

Securing east-west traffic in a virtualized data center with flexible resource allocation

D.

Primarily securing north-south traffic entering and leaving the network

E.

Guarding against external attacks

Full Access
Question # 12

Which two methods are valid ways to populate user-to-IP mappings? (Choose two.)

A.

XML API

B.

Captive portal

C.

User-ID

D.

SCP log ingestion

Full Access
Question # 13

What are three valid Panorama deployment options? (Choose three.)

A.

As a virtual machine (ESXi, Hyper-V, KVM)

B.

With a cloud service provider (AWS, Azure, GCP)

C.

As a container (Docker, Kubernetes, OpenShift)

D.

On a Raspberry Pi (Model 4, Model 400, Model 5)

E.

As a dedicated hardware appliance (M-100, M-200, M-500, M-600)

Full Access
Question # 14

Which action can help alleviate a prospective customer's concerns about transitioning from a legacy firewall with port-based policies to a Palo Alto Networks NGFW with application-based policies?

A.

Discuss the PAN-OS Policy Optimizer feature as a means to safely migrate port-based rules to application-based rules.

B.

Assure the customer that the migration wizard will automatically convert port-based rules to application-based rules upon installation of the new NGFW.

C.

Recommend deploying a new NGFW firewall alongside the customer's existing port-based firewall until they are comfortable removing the port-based firewall.

D.

Reassure the customer that the NGFW supports the continued use of port-based rules, as PAN-OS automatically translates these policies into application-based policies.

Full Access
Question # 15

In which two locations can a Best Practice Assessment (BPA) report be generated for review by a customer? (Choose two.)

A.

PANW Partner Portal

B.

Customer Support Portal

C.

AIOps

D.

Strata Cloud Manager (SCM)

Full Access
Question # 16

What is used to stop a DNS-based threat?

A.

DNS proxy

B.

Buffer overflow protection

C.

DNS tunneling

D.

DNS sinkholing

Full Access
Question # 17

Which two compliance frameworks are included with the Premium version of Strata Cloud Manager (SCM)? (Choose two)

A.

Payment Card Industry (PCI)

B.

National Institute of Standards and Technology (NIST)

C.

Center for Internet Security (CIS)

D.

Health Insurance Portability and Accountability Act (HIPAA)

Full Access
Question # 18

A prospective customer has provided specific requirements for an upcoming firewall purchase, including the need to process a minimum of 200,000 connections per second while maintaining at least 15 Gbps of throughput with App-ID and Threat Prevention enabled.

What should a systems engineer do to determine the most suitable firewall for the customer?

A.

Upload 30 days of customer firewall traffic logs to the firewall calculator tool on the Palo Alto Networks support portal.

B.

Download the firewall sizing tool from the Palo Alto Networks support portal.

C.

Use the online product configurator tool provided on the Palo Alto Networks website.

D.

Use the product selector tool available on the Palo Alto Networks website.

Full Access