Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which three new script types can be analyzed in WildFire? (Choose three.)

A.

VBScript

B.

JScript

C.

MonoScript

D.

PythonScript

E.

PowerShell Script

What are three considerations when deploying User-ID? (Choose three.)

A.

Specify included and excluded networks when configuring User-ID

B.

Only enable User-ID on trusted zones

C.

Use a dedicated service account for User-ID services with the minimal permissions necessary

D.

User-ID can support a maximum of 15 hops

E.

Enable WMI probing in high security networks

An endpoint, inside an organization, is infected with known malware that attempts to make a command-and-control connection to a C2 server via the destination IP address

Which mechanism prevents this connection from succeeding?

A.

DNS Sinkholing

B.

DNS Proxy

C.

Anti-Spyware Signatures

D.

Wildfire Analysis

Which statement is true about Deviating Devices and metrics?

A.

A metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation

B.

Deviating Device Tab is only available with a SD-WAN Subscription

C.

An Administrator can set the metric health baseline along with a valid standard deviation

D.

Deviating Device Tab is only available for hardware-based firewalls

What is the key benefit of Palo Alto Networks Single Pass Parallel Processing design?

A.

There are no benefits other than slight performance upgrades

B.

It allows Palo Alto Networks to add new functions to existing hardware

C.

Only one processor is needed to complete all the functions within the box

D.

It allows Palo Alto Networks to add new devices to existing hardware

When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?

A.

X-Forwarded-For

B.

HTTP method

C.

HTTP response status code

D.

Content type

What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?

A.

Run a Perl script to regularly check for updates and alert when one is released

B.

Monitor update announcements and manually push updates to Crewall

C.

Store updates on an intermediary server and point all the firewalls to it

D.

Use dynamic updates with the most aggressive schedule required by business needs

How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?

A.

Anti-virus (weekly): Application (daily). Threats (weekly), WildFire (5 minutes)

B.

Anti-virus (weekly), Application (daily), Threats (daily), WildFire (5 minutes)

C.

Anti-virus (daily), Application (weekly), Threats (weekly), WildFire (5 minutes)

D.

Anti-virus (daily), Application (weekly), Threats (daily), WildFire (5 minutes)

Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operating Platform prevent? (Choose four.)

A.

breach the perimeter

B.

weaponize vulnerabilities

C.

lateral movement

D.

exfiltrate data

E.

recon the target

F.

deliver the malware

Which statement best describes the business value of Palo Alto Networks Zero Touch Provisioning (ZTP)?

A.

It is designed to simplify and automate the onboarding of new firewalls to the Panorama management server.

B.

When it is in place, it removes the need for an onsite firewall

C.

When the service is purchased, Palo Alto Networks sends an engineer to physically deploy the firewall to the customer environment

D.

It allows a firewall to be automatically connected to the local network wirelessly