Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which type of access allows unmanaged endpoints to access secured on-premises applications?

A.

manual external gateway

B.

secure web gateway (SWG)

C.

GlobalProtect VPN for remote access

D.

Prisma Access Clientless VPN

In which step of the Five-Step Methodology for implementing the Zero Trust model are the services most valuable to the company defined?

A.

Step 2: Map the transaction flows

B.

Step 4: Create the Zero Trust policy

C.

Step 5: Monitor and maintain the network

D.

Step 1: Define the protect surface

Which product continuously monitors each segment from the endpoint to the application and identifies baseline metrics for each application?

A.

App-ID Cloud Engine (ACE)

B.

Autonomous Digital Experience Management (ADEM)

C.

CloudBlades

D.

WildFire

Users connect to a server in the data center for file sharing. The organization wants to decrypt the traffic to this server in order to scan the files being uploaded and downloaded to determine if malware or sensitive data is being moved by users.

Which proxy should be used to decrypt this traffic?

A.

SCP Proxy

B.

SSL Inbound Proxy

C.

SSH Forward Proxy

D.

SSL Forward Proxy

What is a disadvantage of proxy secure access service edge (SASE) when compared to an inline SASE solution?

A.

Proxies force policy actions to be treated as business decisions instead of compromises due to technical limitations.

B.

Teams added additional tools to web proxies that promised to solve point problems, resulting in a fragmented and ineffective security architecture.

C.

Proxy solutions require an unprecedented level of interconnectivity.

D.

Exclusive use of web proxies leads to significant blind spots in traffic and an inability to identify applications and threats on non-standard ports or across multiple protocols.

Which component of the secure access service edge (SASE) solution provides complete session protection, regardless of whether a user is on or off the corporate network?

A.

Zero Trust

B.

threat prevention

C.

single-pass architecture (SPA)

D.

DNS Security

What is feature of Autonomous Digital Experience Management (ADEM)?

A.

It applies configuration changes and provides credential management, role-based controls, and a playbook repository.

B.

It provides customized forms to collect and validate necessary parameters from the requester.

C.

It natively ingests, normalizes, and integrates granular data across the security infrastructure at nearly half the cost of legacy security products attempting to solve the problem.

D.

It provides IT teams with single-pane visibility that leverages endpoint, simulated, and real-time user traffic data to provide the most complete picture of user traffic flows possible.

What is an advantage of the Palo Alto Networks cloud-based security infrastructure?

A.

It provides comprehensive, scalable cloud security with flexible licensing options.

B.

It backhauls traffic to the corporate network.

C.

It allows for the elimination of data centers within five years of implementation.

D.

It increases the footprint of the security solution.

Cloud-delivered App-ID provides specific identification of which two applications? (Choose two.)

A.

unknown-tcp

B.

private

C.

web-browsing

D.

custom

Which three decryption methods are available in a security processing node (SPN)? (Choose three.)

A.

SSL Outbound Proxy

B.

SSHv2 Proxy

C.

SSL Forward Proxy

D.

SSL Inbound Inspection

E.

SSH Inbound Inspection