Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

In which step of the Five-Step Methodology for implementing the Zero Trust model is the Kipling Method relevant?

A.

Step 3: Architect a Zero Trust network

B.

Step 5: Monitor and maintain the network

C.

Step 4: Create the Zero Trust policy

D.

Step 2: Map the transaction flows

Which two prerequisites must an environment meet to onboard Prisma Access mobile users? (Choose two.)

A.

Zoning must be configured to require a user ID for the mobile users trust zone.

B.

Mapping of trust and untrust zones must be configured.

C.

BGP must be configured so that service connection networks can be advertised to the mobile gateways.

D.

Mobile user subnet and DNS portal name must be configured.

What are two ways service connections and remote network connections differ? (Choose two.)

A.

Remote network connections provide secondary WAN options, but service connections use backup service connection for redundancy.

B.

Remote network connections enforce security policies, but service connections do not.

C.

An on-premises resource cannot originate a connection to the internet over a service connection.

D.

Service connections support both OSPF and BGP for routing protocols, but remote networks support only BGP.

Which two point products are consolidated into the Prisma secure access service edge (SASE) platform? (Choose two.)

A.

Autonomous Digital Experience Management (ADEM)

B.

firewall as a service (FWaaS)

C.

Threat Intelligence Platform (TIP)

D.

security information and event management (SIEM)

In the aggregate model, how are bandwidth allocations and interface tags applied beginning in Prisma Access 1.8?

A.

License bandwidth is allocated to a CloudGenix controller; interface tags are set with a compute region.

B.

License bandwidth is allocated to a compute region; interface tags are set with a CloudGenix controller.

C.

License bandwidth is allocated to a compute region; interface tags are set with a Prisma Access location.

D.

License bandwidth is allocated to a Prisma Access location; interface tags are set with a compute region.

Which product enables websites to be rendered in a sandbox environment in order to detect and remove malware and threats before they reach the endpoint?

A.

remote browser isolation

B.

secure web gateway (SWG)

C.

network sandbox

D.

DNS Security

What is a differentiator between the Palo Alto Networks secure access service edge (SASE) solution and competitor solutions?

A.

path analysis

B.

playbooks

C.

ticketing systems

D.

inspections

Which statement applies to Prisma Access licensing?

A.

Internet of Things (IOT) Security is included with each license.

B.

It provides cloud-based, centralized log storage and aggregation.

C.

It is a perpetual license required to enable support for multiple virtual systems on PA-3200 Series firewalls.

D.

For remote network and Clean Pipe deployments, a unit is defined as 1 Mbps of bandwidth.

Which App Response Time metric is the measure of network latency?

A.

Round Trip Time (RTT)

B.

Server Response Time (SRT)

C.

Network Transfer Time (NTTn)

D.

UDP Response Time (UDP-TRT)