Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

WildFire subscription supports analysis of which three types? (Choose three.)

A.

GIF

B.

7-Zip

C.

Flash

D.

RPM

E.

ISO

F.

DMG

Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides autoremediation for anomalous user behavior and malicious activity while maintaining user visibility?

A.

Dynamic user groups (DUGS)

B.

tagging groups

C.

remote device User-ID groups

D.

dynamic address groups (DAGs)

Which statement applies to Palo Alto Networks Single Pass Parallel Processing (SP3)?

A.

It processes each feature in a separate single pass with additional performance impact for each enabled feature.

B.

Its processing applies only to security features and does not include any networking features.

C.

It processes all traffic in a single pass with no additional performance impact for each enabled feature.

D.

It splits the traffic and processes all security features in a single pass and all network features in a separate pass

Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)

A.

define an SSL decryption rulebase

B.

enable User-ID

C.

validate credential submission detection

D.

enable App-ID

E.

define URL Filtering Profile

What two types of certificates are used to configure SSL Forward Proxy? (Сhoose two.)

A.

Enterprise CA-signed certificates

B.

Self-Signed certificates

C.

Intermediate certificates

D.

Private key certificates

Which two types of security chains are supported by the Decryption Broker? (Choose two.)

A.

virtual wire

B.

transparent bridge

C.

Layer 3

D.

Layer 2

A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.

Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)

A.

Informs WildFire and sends up a signature to the Cloud

B.

Collects forensic information about the event

C.

Communicates the status of the endpoint to the ESM

D.

Notifies the user about the event

E.

Remediates the event by deleting the malicious file

Which security profile on the NGFW includes signatures to protect you from brute force attacks?

A.

Zone Protection Profile

B.

URL Filtering Profile

C.

Vulnerability Protection Profile

D.

Anti-Spyware Profile

Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)

A.

Domain Administrators

B.

Enterprise Administrators

C.

Distributed COM Users

D.

Event Log Readers

E.

Server Operator

What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)

A.

when you're delivering a security strategy

B.

when client's want to see the power of the platform

C.

provide users visibility into the applications currently allowed on the network

D.

help streamline the deployment and migration of NGFWs

E.

assess the state of NGFW feature adoption