Q: 1
A security administrator wants to prevent malware, exploit attempts, and inappropriate content from
being downloaded or accessed on the corporate network. Which of the following describes how Content-
ID helps enforce this security policy in Palo Alto Networks Strata and SASE solutions?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 2
Which feature is available in both Panorama and Strata Cloud Manager (SCM)?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 3
Your company recently deployed Palo Alto Networks IoT Security to enhance visibility into IoT devices
across the network. You need to ensure that Device-ID is properly configured to accurately identify and
classify IoT devices. Which of the following is the best practice for enabling Device-ID?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 4
Which two tools can be used to configure Cloud NGFWs for AWS? (Choose two.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 5
Which Panorama centralized management feature allows native and third-party integrations to monitor
VM-Series NGFW logs and objects?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 6
Which functionality does an NGFW use to determine whether new session setups are legitimate or
illegitimate?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 7
How are content updates downloaded and installed for Cloud NGFWs?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 8
Which two components of a Security policy, when configured, allow third-party contractors access to
internal applications outside business hours? (Choose two.)
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 9
Which tool will help refine a security rule by specifying the applications it has viewed in past weeks?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 10
A company uses Prisma Access to provide secure connectivity for mobile users to access its corporate-
sanctioned Google Workspace and wants to block access to all unsanctioned Google Workspace
environments.
What would an administrator configure in the snippet to achieve this goal?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Question 1 of 20 · Page 1 / 2