Which task would be identified in Best Practice Assessment tool?
A. identify the visibility and presence of command-and-control sessions
B. identify sanctioned and unsanctioned SaaS applications
C. identify the threats associated with each application
D. identify and provide recommendations for device management access
Which domain permissions are required by the User-ID Agent for WMI Authentication on a Windows Server? (Choose three.)
A. Domain Administrators
B. Enterprise Administrators
C. Distributed COM Users
D. Event Log Readers
E. Server Operator
Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?
A. Vulnerability Protection profile
B. Antivirus profile
C. URL Filtering profile
D. Anti-Spyware profile
When the Cortex Data Lake is sized for Traps Management Service, which two factors should be considered? (Choose two.)
A. retention requirements
B. Traps agent forensic data
C. the number of Traps agents
D. agent size and OS
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)
A. operational efficiencies due to reduction in manual incident review and decrease in mean time to resolution (MTTR)
B. improved revenue due to more efficient network traffic throughput
C. Increased security due to scalable cloud delivered security Services (CDSS)
D. Cost savings due to reduction in IT management effort and device
Which three script types can be analyzed in WildFire? (Choose three)
A. PythonScript
B. MonoSenpt
C. JScript
D. PowerShell Script
E. VBScript
Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?
A. Option A
B. Option B
C. Option C
D. Option D
Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?
A. Once a day
B. Once a week
C. Once every minute
D. Once an hour
A customer is designing a private data center to host their new web application along with a separate headquarters for users.
Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?
A. Threat Prevention
B. DNS Security
C. WildFire
D. Advanced URL Filtering (AURLF)
Which two steps are required to configure the Decryption Broker? (Choose two.)
A. reboot the firewall to activate the license
B. activate the Decryption Broker license
C. enable SSL Forward Proxy decryption
D. enable a pair of virtual wire interfaces to forward decrypted traffic