A customer currently uses a third-party proxy solution for client endpoints and would like to migrate to Prisma Access to secure mobile user internet-bound traffic.
Which recommendation should the Systems Engineer make to this customer?
AWith the explicit proxy license add-on, set up GlobalProtect.
BWith the mobile user license, set up explicit proxy.
CWith the explicit proxy license, set up a service connection.
DWith the mobile user license, set up a corporate access node.
In which step of the Five-Step Methodology of Zero Trust are application access and user access defined?
AStep 4: Create the Zero Trust Policy
BStep 3: Architect a Zero Trust Network
CStep 1: Define the Protect Surface
DStep 5: Monitor and Maintain the Network
A company is looking for a new security solution to secure their workforce. They have 2,000 users distributed throughout the United States, Canada, and Europe. They have no physical offices, but do have four data centers deployed in AWS and GCP which host private applications. Their CIO wants to make sure the workforce can connect securely to both SaaS and private applications and ensure a good end user experience.
Which licensing model would best fit this scenario?
ALocal Enterprise
BWorldwide Enterprise
CBusiness
DBusiness Premium
What does the combined Mobile Users and Remote Networks SKU include?
AOne mobile user license AND 1 Mbps remote network bandwidth
BOne mobile user license OR 1 Mbps remote network bandwidth
COne mobile user license with no Mbps remote bandwidth
DOne MBPS remote network bandwidth with no mobile user licenses
How does Prisma Access enhance visibility and control over SaaS applications?
CIncidents & Alerts --> Log Viewer --> Application Health
DInsights --> SD-WAN Applications
When licensing Prisma Access, how many service connections are standard with Business Premium?
A0
B1
C2
D5
In the aggregate model, how are bandwidth allocations and interface tags applied beginning in Prisma Access 1.8?
ALicense bandwidth is allocated to a CloudGenix controller; interface tags are set with a compute region.
BLicense bandwidth is allocated to a compute region; interface tags are set with a CloudGenix controller.
CLicense bandwidth is allocated to a compute region; interface tags are set with a Prisma Access location.
DLicense bandwidth is allocated to a Prisma Access location; interface tags are set with a compute region.
A current Prisma SASE customer has recently onboarded several new SaaS applications, and they are concerned about their security posture regarding administrative settings. The IT team does not have experience with these applications, and is unsure what the best base security settings would be.
Which product would fit the customer's needs?
AIoT Security
BPrisma SD-WAN
CSSPM
DSaaS Security
Which three decryption methods are available in a security processing node (SPN)? (Choose three.)
ASSL Outbound Proxy
BSSHv2 Proxy
CSSL Forward Proxy
DSSL Inbound Inspection
ESSH Inbound Inspection
A prospective Prisma Access customer has a requirement to allow their remote developers access to their local branch offices.
Which add-on is needed to allow users to branch office access?
AGlobalProtect
BExplicit proxy
CNext Generation CASB
DNet Interconnect license
Which feature of Prisma SD-WAN helps reduce operational complexity?
AAIOps for SASE
BURL Filtering
CAuto VPN
DSD-WAN Edge
Which App Response Time metric measures the amount of time it takes to transfer incoming data from an external server to a local client?
AUDP Response Time (UDP-TRT)
BServer Response Time (SRT)
CNetwork Transfer Time (NTTn)
DRound Trip Time (RTT)
Which two prerequisites must an environment meet to onboard Prisma Access mobile users? (Choose two.)
AZoning must be configured to require a user ID for the mobile users trust zone.
BMapping of trust and untrust zones must be configured.
CBGP must be configured so that service connection networks can be advertised to the mobile gateways.
DMobile user subnet and DNS portal name must be configured.
How does SaaS Security Inline help prevent the data security risks of unsanctioned security-as-a-service (SaaS) application usage on a network?