MultipleChoice
A price sensitive customer wants to prevent attacks on a windows 2008 Virtual Server. The server will max out at 100Mbps but needs to have 45,000 sessions to connect to multiple hosts within a data center
Which VM instance should be used to secure the network by this customer?
OptionsMultipleChoice
Palo Alto Networks publishes updated Command and Control signatures.
How frequently should the related signatures schedule be set?
OptionsMultipleChoice
Where are three tuning considerations when building a security policy to protect against modern day attacks? (Choose three)
OptionsMultipleChoice
XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy.
Which two features must be enabled to meet the customer’s requirements? (Choose two.)
OptionsMultipleChoice
Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
OptionsMultipleChoice
A customer is worried about unknown attacks, but due to privacy and regulatory issues, won't implement SSL decrypt.
How can the platform still address this customer's concern?
OptionsMultipleChoice
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
OptionsMultipleChoice
A client chooses to not block uncategorized websites.
Which two additions should be made to help provide some protection? (Choose two.)
OptionsMultipleChoice
Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)
OptionsMultipleChoice
Which functionality is available to firewall users with an active Threat Prevention subscription, but no WildFire license?
Options