Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In an HA pair running Active/Passive mode, over which interface do the dataplanes communicate?

A.

HA3

B.

HA1

C.

HA2

D.

HA4

Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)

A.

WildFire analysis

B.

Dynamic user groups (DUGs)

C.

Multi-factor authentication (MFA)

D.

URL Filtering Profiles

Which three mechanisms are valid for enabling user mapping? (Choose three.)

A.

Captive Portal

B.

Domain server monitoring

C.

Reverse DNS lookup

D.

User behaviour recognition

E.

Client probing

What is the basis for purchasing Cortex XDR licensing?

A.

volume of logs being processed based on Datalake purchased

B.

number of nodes and endpoints providing logs

C.

unlimited licenses

D.

number of NGFWs

What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}

A.

prevention of cyber attacks

B.

safe enablement of all applications

C.

threat remediation

D.

defense against threats with static security solution

What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?

A.

allow the request and all subsequent responses

B.

temporarily disable the DNS Security function

C.

block the query

D.

discard the request and all subsequent responses

Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)

A.

eDirectory monitoring

B.

Client Probing

C.

SNMP server

D.

TACACS

E.

Active Directory monitoring

F.

Lotus Domino

G.

RADIUS

Which three platform components can identify and protect against malicious email links? (Choose three.)

A.

WildFire hybrid cloud solution

B.

WildFire public cloud

C.

WF-500

D.

M-200

E.

M-600

Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)

A.

Enable User Credential Detection

B.

Enable User-ID

C.

Define a Secure Sockets Layer (SSL) decryption rule base

D.

Enable App-ID

E.

Define a uniform resource locator (URL) Filtering profile

Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?

A)

B)

C)

D)

A.

Option

B.

Option

C.

Option

D.

Option