Which three components are specific to the Query Builder found in the Custom Report creation dialog of the firewall? (Choose three.)
In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)
Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should the related signatures schedule be set?
Which two features can be enabled to support asymmetric routing with redundancy on a Palo
Alto networks next-generation firewall (NGFW)? (Choose two.)
Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)
A company has deployed the following
• VM-300 firewalls in AWS
• endpoint protection with the Traps Management Service
• a Panorama M-200 for managing its VM-Series firewalls
• PA-5220s for its internet perimeter,
• Prisma SaaS for SaaS security.
Which two products can send logs to the Cortex Data Lake? (Choose two).
How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)
In an HA pair running Active/Passive mode, over which interface do the dataplanes communicate?
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
Which functionality is available to firewall users with an active Threat Prevention subscription, but no WildFire license?
An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites. How should the SE show the customer the firewall can detect that these websites are being accessed?
What are two core values of the Palo Alto Network Security Operating Platform? (Choose two.}
A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The server will max out at 100Mbps but needs to have 45.000 sessions to connect to multiple hosts within a data center
Which VM instance should be used to secure the network by this customer?
Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?
A)
B)
C)
D)
Match the functions to the appropriate processing engine within the dataplane.