Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?

A.

Once a day

B.

Once a week

C.

Once every minute

D.

Once an hour

What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?

A.

It eliminates of the necessity for dynamic analysis in the cloud

B.

It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity

C.

It is always able to give more accurate verdicts than the cloud ML analysis reducing false positives and false negatives

D.

It improves the CPU performance of content inspection

A packet that is already associated with a current session arrives at the firewall.

What is the flow of the packet after the firewall determines that it is matched with an existing session?

A.

it is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through a single stream-based content inspection engine before egress.

B.

It is sent through the slow path for further inspection. If subject to content inspection, it will pass through a single stream-based content inspection engines before egress

C.

It is sent through the fast path because session establishment is not required. If subject to content inspection, it will pass through multiple content inspection engines before egress

D.

It is sent through the slow path for further inspection. If subject to content inspection, it will pass through multiple content inspection engines before egress

What helps avoid split brain in active / passive high availability (HA) pair deployment?

A.

Enable preemption on both firewalls in the HA pair.

B.

Use a standard traffic interface as the HA3 link.

C.

Use the management interface as the HA1 backup link

D.

Use a standard traffic interface as the HA2 backup

What are two advantages of the DNS Sinkholing feature? (Choose two.)

A.

It forges DNS replies to known malicious domains.

B.

It monitors DNS requests passively for malware domains.

C.

It can be deployed independently of an Anti-Spyware Profile.

D.

It can work upstream from the internal DNS server.

A Fortune 500 customer has expressed interest in purchasing WildFire; however, they do not want to send discovered malware outside of their network.

Which version of WildFire will meet this customer’s requirements?

A.

WildFire Private Cloud

B.

WildFire Government Cloud

C.

WildFire Secure Cloud

D.

WildFire Public Cloud

What are two presales selling advantages of using Expedition? (Choose two.)

A.

map migration gaps to professional services statement of Works (SOWs)

B.

streamline & migrate to Layer7 policies using Policy Optimizer

C.

reduce effort to implement policies based on App-ID and User-ID

D.

easy migration process to move to Palo Alto Networks NGFWs

In which two ways can PAN-OS software consume MineMeld outputs? (Choose two.)

A.

TXT

B.

API

C.

CSV

D.

EDL

A service provider has acquired a pair of PA-7080s for its data center to secure its customer base's traffic. The server provider's traffic is largely generated by smart phones and averages 6.000,000 concurrent sessions.

Which Network Processing Card should be recommended in the Bill of Materials?

A.

PA-7000-20GQ-NPC

B.

PA-7000-40G-NPC

C.

PA-7000-20GQXM-NPC

D.

PA-7000-20G-NPC

Which profile or policy should be applied to protect against port scans from the internet?

A.

Interface management profile on the zone of the ingress interface

B.

Zone protection profile on the zone of the ingress interface

C.

An App-ID security policy rule to block traffic sourcing from the untrust zone

D.

Security profiles to security policy rules for traffic sourcing from the untrust zone