Which two products can send logs to the Cortex Data Lake? (Choose two.)
A. AutoFocus
B. PA-3260 firewall
C. Prisma Access
D. Prisma Public Cloud
When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?
A. X-Forwarded-For
B. HTTP method
C. HTTP response status code
D. Content type
Which are the three mandatory components needed to run Cortex XDR? (Choose three.)
A. Panorama
B. NGFW with PANOS 8 0.5 or later
C. Cortex Data Lake
D. Traps
E. Pathfinder
F. Directory Syn Service
A customer requires an analytics tool with the following attributes:
1.
Uses the logs on the firewall to detect actionable events on the network
2.
Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network
3.
Pinpoints the area of risk and allows for assessment of the risk to action can be taken to prevent exploitation of network resources
Which feature of PAN-OS will address these requirements?
A. WildFire with application program interface (API) calls for automation
B. Third-party security information and event management (SIEM) which can ingest next-generation firewall (NGFW) logs
C. Automated correlation engine (ACE)
D. Cortex XDR and Cortex Data Lake
Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)
A. Connector
B. Database
C. Recipient
D. Operator
E. Attribute
F. Schedule
Which two features can be enabled to support asymmetric routing with redundancy on a Palo Alto networks next-generation firewall (NGFW)? (Choose two.)
A. Active / active high availability (HA)
B. Multiple virtual systems
C. non-SYN first packet
D. Asymmetric routing profile
A customer requires protections and verdicts for portable executable (PE) and executable and linkable format (ELF), as well as the ability to integrate with existing security tools.
Which Cloud-Delivered Security Service (CDSS) does Palo Alto Networks provide that will address this requirement?
A. Dynamic Unpacking
B. WildFire
C. DNS Security
D. File Blocking profile
Which option is required to Activate/Retrieve a Device Management License on the M-100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?
A. Generate a Stats Dump File and upload it to the Palo Alto Networks support portal
B. Select Panorama > Licenses and click Activate feature using authorization code
C. Generate a Tech Support File and call PANTAC
D. Select Device > Licenses and click Activate feature using authorization code
What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}
A. prevention of cyber attacks
B. safe enablement of all applications
C. threat remediation
D. defense against threats with static security solution
When having a customer pre-sales call, which aspects of the NGFW should be covered?
A. The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networks
B. The Palo Alto Networks-developed URL filtering database, PAN-DB provides high-performance local caching for maximum inline performance on URL lookups, and offers coverage against malicious URLs and IP addresses. As WildFire identifies unknown malware, zero-day exploits, and advanced persistent threats (APTs), the PAN-DB database is updated with information on malicious URLs so that you can block malware downloads and disable Command and Control (C2) communications to protect your network from cyberthreats. URL categories that identify confirmed malicious content --malware, phishing, and C2 are updated every five minutes --to ensure that you can manage access to these sites within minutes of categorization
C. The NGFW creates tunnels that allow users/systems to connect securely over a public network, as if they were connecting over a local area network (LAN). To set up a VPN tunnel you need a pair of devices that can authenticate each other and encrypt the flow of information between them The devices can be a pair of Palo Alto Networks firewalls, or a Palo Alto Networks firewall along with a VPN-capable device from another vendor
D. Palo Alto Networks URL Filtering allows you to monitor and control the sites users can access, to prevent phishing attacks by controlling the sites to which users can submit valid corporate credentials, and to enforce safe search for search engines like Google and Bing