What helps avoid split brain in active/passive HA pair deployment?
AUse a standard traffic interface as the HA2 backup
BEnable preemption on both firewalls in the HA pair
CUse the management interface as the HA1 backup link
DUse a standard traffic interface as the HA3 link
Which functionality is available to firewall users with an active Threat Prevention subscription, but no WildFire license?
AAccess to the WildFire API
BWildFire hybrid deployment
CPE file upload to WildFire
D5 minute WildFire updates to threat signatures
Which CLI commands allows you to view SD-WAN events such as path selection and path quality measurements?
A
show sdwan connection all
B
show sdwan event
C
show sdwan path-monitor stats vif
D
show sdwan session distribution policy-name
Which two actions can be taken to enforce protection from brute force attacks in the security policy? (Choose two.)
ACreate a log forwarding object to send logs to Panorama and a third-party syslog server event correlation
BInstall content updates that include new signatures to protect against emerging threats
CAttach the vulnerability profile to a security rule
DAdd the URL filtering profile to a security rule
Which two methods will help avoid Split Brain when running HA in Active/Active mode? (Choose two.)
AConfigure a Backup HA1 Interface
BConfigure a Heartbeat Backup
CCreate a loopback IP address and use that as a Source Interface
DPlace your management interface in an Aggregate Interface Group configuration
DRAG DROP -
Match the functions to the appropriate processing engine within the dataplane.
Select and Place:
XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy.
Which two features must be enabled to meet the customer's requirements? (Choose two.)
AVirtual systems
BHA active/active
CHA active/passive
DPolicy-based forwarding
A prospective customer wants to purchase a next-generation firewall (NGFW) and requires at least 2 million concurrent sessions with a minimum of 10Gbps of throughput with threat detection enabled.
Which tool will help quickly determine the correct size of NGFW for this customer?
AData Lake Calculator available on the Palo Alto Networks website
BNGFW sizing app available for iOS and Android devices
CProduct Comparison tool available on the Palo Alto Networks website
DQuoting tool available on the Palo Alto Networks website
Which statement is true about Deviating Devices and metrics?
AA metric health baseline is determined by averaging the health performance for a given metric over seven days plus the standard deviation
BDeviating Device Tab is only available with a SD-WAN Subscription
CAn Administrator can set the metric health baseline along with a valid standard deviation
DDeviating Device Tab is only available for hardware-based firewalls
You have enabled the WildFire ML for PE files in the antivirus profile and have added the profile to the appropriate firewall rules. When you go to Palo Alto
Networks WildFire test av file and attempt to download the test file it is allowed through. In order to verify that the machine learning is working from the command line, which command returns a valid result?
Ashow mlav cloud-status
Bshow wfml cloud-status
Cshow ml cloud-status
Dshow wfav cloud-status
Which action can prevent users from unknowingly downloading potentially malicious file types from the internet?
AApply a File Blocking profile to Security policy rules that allow general web access.
BApply a Zone Protection profile to the untrust zone.
CAssign a Vulnerability profile to Security policy rules that deny general web access.
DAssign an Antivirus profile to Security policy rules that deny general web access.
Access to a business site is blocked by URL Filtering inline machine learning (ML) and considered as a false-positive.
How should the site be made available?
ACreate a custom URL category and add it on exception of the inline ML profile.
BChange the action of real-time-detection category on URL filtering profile.
CCreate a custom URL category and add it to the Security policy.
DDisable URL Filtering inline ML.
A WildFire subscription is required for which two of the following activities? (Choose two.)
AEnforce policy based on Host Information Profile (HIP).
BForward advanced file types from the firewall for analysis.
CFilter uniform resource locator (URL) sites by category.
DDecrypt Secure Sockets Layer (SSL).
EUse the WildFire Application Programming Interface (API) to submit website links for analysis.
A customer with a fully licensed Palo Alto Networks firewall is concerned about threats based on domain generation algorithms (DGAs).
Which Security profile is used to configure Domain Name Security (DNS) to identify and block previously unknown DGA-based threats in real time?
AAnti-Spyware profile
BURL Filtering profile
CVulnerability Protection profile
DWildFire Analysis profile
Which two actions can be configured in an Anti-Spyware profile to address command-and-control (C2) traffic from compromised hosts? (Choose two.)
ARedirect
BAlert
CQuarantine
DReset
Which PAN-OS feature should be discussed if a prospect wants to apply Security policy actions to traffic by using tags from their virtual environment?
AMachine learning (ML)
BDynamic User Groups
CURL blocking
DMineMeld
What are three considerations when deploying User-ID? (Choose three.)
ASpecify included and excluded networks when configuring User-ID
BOnly enable User-ID on trusted zones
CUse a dedicated service account for User-ID services with the minimal permissions necessary
DUser-ID can support a maximum of 15 hops
EEnable WMI probing in high security networks
What is an advantage of having WildFire machine learning (ML) capability inline on the firewall?
AIt eliminates of the necessity for dynamic analysis in the cloud.
BIt is always able to give more accurate verdicts than the cloud ML analysis, reducing false positives and false negatives,
CIt improves the CPU performance of content inspection.
DIt enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity.
A potential customer requires an NGFW solution that enables high-throughput, low-latency network security and also inspects the application.
Which aspect of the Palo Alto Networks NGFW capabilities should be highlighted to help address these requirements?
Asingle-pass architecture (SPA)
Bthreat prevention
CGlobalProtect
DElastic Load Balancing (ELB)
The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?
ADNS Security
BThreat Prevention
CWildFire
DIoT Security
What allows verification of machine learning (ML) functionality for WildFire during a proof of concept?
AExecution of the appropriate CLI command
BUtilization of the ACC reports
CReviewing traffic in the traffic log
DChecking the counters
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three.)
Aminimized threat landscape due to reducing internet footprint to a single point of failure
Bcost savings due reduction in IT management effort and device consolidation
Cimproved revenue due to more efficient network traffic throughput
Doperational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)
Eincreased security due to scalable cloud-delivered security services (CDSS)
Which PAN-OS feature helps prevent user credential theft?
ADrive-by download protection
BAdvanced URL Filtering (AURLF)
CData loss prevention (DLP)
DMulti-factor authentication (MFA)
A customer requires protections and verdicts for PE (portable executable) and ELF (executable and linkable format) as well as integration with products and services can also access the immediate verdicts to coordinate enforcement to prevent successful attacks.
What competitive feature does Palo Alto Networks provide that will address this requirement?
AFile Blocking Profile
BDynamic Unpacking
CWildFire
DDNS Security
Which deployment option of Advanced URL Filtering (AURLF) would help a prospect that actively uses PAC files?