Which section of a Security Lifecycle Review (SLR) report summarizes risk exposure by breaking down a detected attack on the network?
A. Advanced URL Filtering Analysis
B. SaaSApplications
C. Threats at a Glance
D. Applications that Introduce Risk
Which two of the following are benefits of the Palo AltoNetworks Zero Trust architecture? (Choose two.)
Select 2 Correct Responses
A. tighter access control
B. increased detection of threats and infiltration
C. more network segments
D. cloud-based virtual private network (VPN)
Which two of the following are ways that Palo Alto Networks CloudDelivered Security Services (CDSS) use confidential information collected from users? (Choose two.)
Select 2 Correct Responses
A. legal compliance
B. attack retaliation attribution
C. verification of entitlements
D. verification of applicant statements
Which three key functions are processed as part of the Palo Alto Networks single-pass architecture (SPA)?
(Choose three.)
Select 3 Correct Responses
A. User-ID
B. Content-ID
C. Intruder-ID
D. Device-ID
E. Virus-ID
Which two Cloud-Delivered Security Services (CDSS) would be appropriate for an organization that wants to secure internet traffic on a perimeter firewall? (Choose two.) Select 2 Correct Responses
A. WildFire
B. Advanced URL Filtering (AURLF)
C. Autonomous Digital Experience Management (ADEM)
D. SD-WAN
In which two of the following scenarios is personal data excluded fromprotection under the General Data Protection Regulation (GDPR)?
Select 2 Correct Responses
A. The data was automated as part of an information filing system.
B. The data was generated in the course of a purely personal or household activity.
C. The data will be used for the prevention of criminal offenses.
D. The data is related to a person's economic or cultural identity.
Using a comprehensive range of natively-integratedsubscriptions and inline machine learning (ML), what does a Next-Generation Firewall (NGFW) use to prevent known and unknown threats in real time?
A. Cloud Delivered Security Services (CDSS)
B. Cloud Security Posture Management (CSPM)
C. Cloud NativeSecurity Platform (CNSP)
D. Cloud Identity Access Management (CIAM)
A customer has enabled the Threat Prevention subscription on their Palo Alto Networks Next-Generation Firewall.
How will the performance of the firewall beaffected if the customer also enables both WildFire and User-ID?
A. The maximum throughput performance will be reduced, but the impact will vary based on the firewall model being used.
B. Enabling User-ID will have no additional performance impact, but enabling WildFire will reduce throughput.
C. There will be no additional performance impact to the firewall, and throughput will remain the same, regardless of firewall model.
D. Enabling WildFire will have no additional performance impact, but enabling User-ID will reduce throughput.
Which of the following statements applies to enabling App-ID on a Next-Generation Firewall (NGFW)?
A. No additional purchase is required, but App-ID must be enabled for the customer to use it.
B. An App-ID subscription must be purchased and enabled.
C. No configuration is required, because App-ID is always enabled by default.
D. A Threat Protection license must be purchased and enabled.
Which path will generate a stats dump file on a Palo Alto Networks Next-Generation Firewall (NGFW)?
A. Device > Support > Generate Statsdump
B. Device > Statsdump > Generate Statsdump
C. Device > SLR > Generate Statsdump
D. Device > Files > Generate Statsdump