Which three activities can the botnet report track? (Choose three.)
Answer : ACF
Reference:
https://media.paloaltonetworks.com/documents/Controlling-Botnets.pdf
A customer requires protections and verdicts for PE (portable executable) and ELF (executable and linkable format) as well as integration with products and services can also access the immediate verdicts to coordinate enforcement to prevent successful attacks.
What competitive feature does Palo Alto Networks provide that will address this requirement?
Answer : C
Reference:
https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/latest-wildfire-cloud-features/real-time-wildfire-verdicts-and-signatures-for-pe-and-elf- files.html
Which statement is true about Deviating Devices and metrics?
Answer : A
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/panorama-web-interface/panorama-managed-devices-summary/panorama- managed-devices-health.html
DRAG DROP -
Match the WildFire Inline Machine Learning Model to the correct description for that model.
Select and Place:
Answer :
Reference:
https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/wildfire-features-in-panos-100/configure-wildfire-inline-ml.html
Palo Alto Networks publishes updated Command-and-Control signatures.
How frequently should the related signatures schedule be set?
Answer : C
Which two methods will help avoid Split Brain when running HA in Active/Active mode? (Choose two.)
Answer : AB
Reference:
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/high-availability/set-up-activeactive-ha/configure-activeactive-ha.html
Which three script types can be analyzed in WildFire? (Choose three.)
Answer : ABD
Reference:
https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/wildfire-features-in-panos-90/wildfire-appliance-script-support.html
What helps avoid split brain in active/passive HA pair deployment?
Answer : C
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/high-availability/set-up-activepassive-ha/configure-activepassive-ha.html
DRAG DROP -
Match the functions to the appropriate processing engine within the dataplane.
Select and Place:
Answer :
What are three considerations when deploying User-ID? (Choose three.)
Answer : ABC
Reference:
https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVPCA0
Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)
Answer : ABC
Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)
Answer : ADE
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/monitoring/view-and-manage-reports/generate-custom-reports
Which CLI commands allows you to view SD-WAN events such as path selection and path quality measurements?
Answer : B
Reference:
https://docs.paloaltonetworks.com/sd-wan/1-0/sd-wan-admin/troubleshooting/use-cli-commands-for-sd-wan-tasks.html
Which three steps in the cyberattack lifecycle does Palo Alto Networks Security Operating Platform prevent? (Choose three.)
Answer : BCE
Reference:
https://www.exclusive-networks.com/ch-fr/praevention-cyber-attack-lifecycle-palo-alto/
Which profile or policy should be applied to protect against port scans from the internet?
Answer : B
Reference:
https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/network/network-network-profiles-zone-protection/reconnaissance- protection.html
Have any questions or issues ? Please dont hesitate to contact us