Which option is required to Activate/Retrieve a Device Management License on the M-100 Appliance after the Auth Codes have been activated on the Palo Alto Networks Support Site?
Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)
When HTTP header logging is enabled on a URL Filtering profile, which attribute-value can be logged?
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
A company has deployed the following
• VM-300 firewalls in AWS
• endpoint protection with the Traps Management Service
• a Panorama M-200 for managing its VM-Series firewalls
• PA-5220s for its internet perimeter,
• Prisma SaaS for SaaS security.
Which two products can send logs to the Cortex Data Lake? (Choose two).
Which two steps are required to configure the Decryption Broker? (Choose two.)
An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?
Which three actions should be taken before deploying a firewall evaluation unt in a customer environment? (Choose three.)
Which two components must be configured within User-ID on a new firewall that has been implemented? (Choose two.)
The firewall includes predefined reports, custom reports can be built for specific data and actionable tasks, or predefined and custom reports can be combined to compile information needed to monitor network security.
The firewall provides which three types of reports? (Choose three.)
Which Security profile on the Next-Generation Firewall (NGFW) includes Signatures to protect against brute force attacks?
The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?
Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)
A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center
Which VM instance should be used to secure the network by this customer?
WildFire subscription supports analysis of which three types? (Choose three.)