Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

What key capability distinguishes Content-ID technology from conventional network security approaches?

A.

It performs packet header analysis short of deep packet inspection.

B.

It provides single-pass application layer inspection for real-time threat prevention.

C.

It exclusively monitors network traffic volumes.

D.

It relies primarily on reputation-based filtering.

Full Access
Question # 5

An administrator wants to implement additional Cloud-Delivered Security Services (CDSS) on a data center NGFW that already has one enabled. What benefit does the NGFW’s single-pass parallel processing (SP3) architecture provide?

A.

It allows for traffic inspection at the application level.

B.

There will be no additional performance degradation.

C.

There will be only a minor reduction in performance.

D.

It allows additional security inspection devices to be added inline.

Full Access
Question # 6

An NGFW administrator is updating PAN-OS on company data center firewalls managed by Panorama. Prior to installing the update, what must the administrator verify to ensure the devices will continue to be supported by Panorama?

A.

Device telemetry is enabled.

B.

Panorama is configured as the primary device in the log collecting group for the data center firewalls.

C.

All devices are in the same template stack.

D.

Panorama is running the same or newer PAN-OS release as the one being installed.

Full Access
Question # 7

Which security profile provides real-time protection against threat actors who exploit the misconfigurations of DNS infrastructure and redirect traffic to malicious domains?

A.

Antivirus

B.

URL Filtering

C.

Vulnerability Protection

D.

Anti-spyware

Full Access
Question # 8

A network administrator obtains Palo Alto Networks Advanced Threat Prevention and Advanced DNS Security subscriptions for edge NGFWs and is setting up security profiles. Which step should be included in the initial configuration of the Advanced DNS Security service?

A.

Create a decryption policy rule to decrypt DNS-over-TLS / port 853 traffic.

B.

Create overrides for all company owned FQDNs.

C.

Configure DNS Security signature policy settings to sinkhole malicious DNS queries.

D.

Enable Advanced Threat Prevention with default settings and only focus on high-risk traffic.

Full Access
Question # 9

Which action optimizes user experience across a segmented network architecture and implements the most effective method to maintain secure connectivity between branch and campus locations?

A.

Establish site-to-site tunnels on each branch and campus firewall and have individual VLANs for each department.

B.

Configure all branch and campus firewalls to use a single shared broadcast domain.

C.

Implement SD-WAN to route all traffic based on network performance metrics and use zone protection profiles.

D.

Configure a single campus firewall to handle the routing of all branch traffic.

Full Access
Question # 10

Which functionality does an NGFW use to determine whether new session setups are legitimate or illegitimate?

A.

SYN bit

B.

SYN cookies

C.

Random Early Detection (RED)

D.

SYN flood protection

Full Access
Question # 11

Which two features can a network administrator use to troubleshoot the issue of a Prisma Access mobile user who is unable to access SaaS applications? (Choose two.)

A.

SaaS Application Risk Portal

B.

Capacity Analyzer

C.

GlobalProtect logs

D.

Autonomous Digital Experience Manager (ADEM) console

Full Access
Question # 12

How can a firewall administrator block a list of 300 unique URLs in the most time-efficient manner?

A.

Use application filters to block the App-IDs.

B.

Use application groups to block the App-IDs.

C.

Import the list into a custom URL category.

D.

Block multiple predefined URL categories.

Full Access
Question # 13

After a firewall is associated with Strata Cloud Manager (SCM), which two additional actions are required to enable management of the firewall from SCM? (Choose two.)

A.

Deploy a service connection for each branch site and connect with SCM.

B.

Configure NTP and DNS servers for the firewall.

C.

Configure a Security policy allowing “stratacloudmanager.paloaltonetworks.com” for all users.

D.

Install a device certificate.

Full Access
Question # 14

What occurs when a security profile group named “default” is created on an NGFW?

A.

It only applies to traffic that has been dropped due to the reset client action.

B.

It allows traffic to bypass all security checks by default.

C.

It negates all existing security profiles rules on new policy.

D.

It is automatically applied to all new security rules.

Full Access
Question # 15

Which two prerequisites must be evaluated when decrypting internet-bound traffic? (Choose two.)

A.

RADIUS profile

B.

Incomplete certificate chains

C.

Certificate pinning

D.

SAML certificate

Full Access
Question # 16

A company has an ongoing initiative to monitor and control IT-sanctioned SaaS applications. To be successful, it will require configuration of decryption policies, along with data filtering and URL Filtering Profiles used in Security policies. Based on the need to decrypt SaaS applications, which two steps are appropriate to ensure success? (Choose two.)

A.

Configure SSL Forward Proxy.

B.

Validate which certificates will be used to establish trust.

C.

Configure SSL Inbound Inspection.

D.

Create new self-signed certificates to use for decryption.

Full Access
Question # 17

Which two configurations are required when creating deployment profiles to migrate a perpetual VM-Series firewall to a flexible VM? (Choose two.)

A.

Choose “Fixed vCPU Models” for configuration type.

B.

Allocate the same number of vCPUs as the perpetual VM.

C.

Allow only the same security services as the perpetual VM.

D.

Deploy virtual Panorama for management.

Full Access
Question # 18

Which two security services are required for configuration of NGFW Security policies to protect against malicious and misconfigured domains? (Choose two.)

A.

Advanced Threat Prevention

B.

SaaS Security

C.

Advanced WildFire

D.

Advanced DNS Security

Full Access