Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which architecture is unique to Palo Alto Networks and results in no additional performance overhead when enabling additional features?

A.

multi-pass

B.

multiple-core threaded

C.

single-pass

D.

no-pass

Which subscription should be activated when a predefined, known malicious IP address is updated?

A.

WildFire

B.

Cortex Data Lake

C.

Threat Prevention

D.

URL Filtering

Which two of the following are benefits of the Palo Alto Networks Zero Trust architecture? (Choose two.)

Select 2 Correct Responses

A.

tighter access control

B.

increased detection of threats and infiltration

C.

more network segments

D.

cloud-based virtual private network (VPN)

A customer has enabled the Threat Prevention subscription on their Palo Alto Networks Next-Generation Firewall.

How will the performance of the firewall be affected if the customer also enables both WildFire and User-ID?

A.

The maximum throughput performance will be reduced, but the impact will vary based on the firewall model being used.

B.

Enabling User-ID will have no additional performance impact, but enabling WildFire will reduce throughput.

C.

There will be no additional performance impact to the firewall, and throughput will remain the same, regardless of firewall model.

D.

Enabling WildFire will have no additional performance impact, but enabling User-ID will reduce throughput.

Which section of a Security Lifecycle Review (SLR) report summarizes risk exposure by breaking down a detected attack on the network?

A.

Advanced URL Filtering Analysis

B.

SaaS Applications

C.

Threats at a Glance

D.

Applications that Introduce Risk

How does Cloud Identity Engine (CIE) simplify deployment of cloudbased services to provide user authentication?

A.

It allows configuration of an authentication source once instead of for each authentication method.

B.

It expands the capability to filter and forward decrypted and non-decrypted Transport Layer Security (TLS) traffic.

C.

It ensures that a compromised master key does not compromise the configuration encryption for an entire deployment.

D.

It authenticates users via a cloud-based service and refers to the hub for mappings for group identification.

The ability of a Next-Generation Firewall (NGFW) to logically group physical and virtual interfaces and then control traffic based on that grouping is known as what?

A.

LLDP profiles

B.

security zones

C.

DHCP groups

D.

security profile groups

Implementation of which PAN-OS feature improves visibility and prevention of malware?

A.

Anti-Spyware profiles

B.

Data Filtering profiles

C.

Decryption profiles

D.

Antivirus profiles

Which Palo Alto Networks product offers a centrally managed firewall update process?

A.

SD_WAN

B.

Prisma SaaS

C.

Panorama

D.

WildFire

What file is needed from a firewall to generate a Security Lifecycle Review (SLR) report when creating the SLR?

A.

tech support file

B.

Panorama plugin registration file

C.

stats dump file

D.

system process core file