What is the HA limitation specific to the PA-200 appliance?
A. Can be deployed in either an active/passive or active/active HA pair
B. Can only synchronize configurations and does not support session synchronization
C. Has a dedicated HA1 and HA2 ports, but no HA3
D. Is the only Palo Alto Networks firewall that does not have any HA capabilities
What are three considerations when deploying User-ID. (Choose three.)
A. Enable WMI probing in high security networks
B. User-ID can support a maximum hops.
C. Specify included and excluded networks when configuring User-ID
D. Use a dedicated service account for User-ID services with the minimal permissions necessary.
E. Only enable User-ID on trusted zones
Which four steps of the cyberattack lifecycle dose the Palo Alto Networks platform present? (Choose four)
A. Breach the perimeter
B. Exfiltrate data
C. Weaponries vulnerabilities
D. Deliver the malware
E. Recon the target
F. Lateral movement
Because of regulatory compliance a customer cannot decrypt specific types of traffic.
Which license should an SE recommend to the customer who will be decrypting traffic on the Palo Alto Networks firewall?
A. App-ID, to use applications as match criteria in the decryption policy rules
B. SSL Decryption, for inbound inspection and granular Forward Proxy SSL decryption
C. Support, to request custom categories as match criteria in decryption policy rules
D. URL Filtering, to use predefined URL categories as match criteria in the decryption policy rules
An administrator needs a PDF summary report that contains information compiled from existing reports
based on data for the top 5 in each category.
How often will the Administrator receive the report?
A. Bi-weekly
B. Daily
C. Weekly
D. Monthly
Which three policies or certificates must be configured for SSL Forward Proxy decryption? (Choose three.)
A. Forward trust certificate
B. Forward untrust certificate
C. A decrypt port mirror policy
D. Internal server certificate
E. A decryption policy
What are two core values of the Palo Alto Network Security Platform? (Choose two)
A. Sale enablement of all applications
B. Deployment of multiple point-based solutions to provide full security coverage
C. Prevention of cyberattacks
D. Threat remediation
E. Defense against threats with static security solution
An endpoint, inside an organization, is infected with known malware. The malware attempts to make a command and control connection to a CandC server via the destination IP address.
Which mechanism prevent this connection from succeeding?
A. DNS Sinkholing
B. DNS Proxy
C. Anti-Spyware Signatures
D. Wildfire Analysis
A network covers three geographical areas: Americas, Europe (EMEA), and Asia (APAC). The APAC
segment of the network consists of nine HA pairs of PA-3060 firewalls, generating a combined log output K
logs per second.
Only 14 days of traffic log retention is required.
Which management and logging solution will be effective and cost-efficient for this segment of the network?
A. Two M-500s in HA management at the global level, with one M-100 with 4 TB of storage for APAC
B. Two M-500s in HA management at the global level, and one log collector-mode M-500 with 8 TB of storage for APAC
C. Two M-500s in HA management at the global level, and two log collector-mode M-500s in a log collector group with 16 TB of storage for APAC
D. Two Dual-mode M-500s in HA for both global management and storage. Each M-500 has 8 TB of storage
Which two features are found in a next-generation firewall but are absent in a legacy firewall product? (Choose two)
A. Identification of application is possible on any port
B. Traffic is separated by zones
C. Traffic control is based on IP, port, and protocol
D. Policy match is a based on application
E. Onboard SSL decryption capability is used