Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following is an appropriate first step for a customer interested in moving to Zero Trust?

A.

Ask administrators to switch on the Zero Trust options and features of their current products.

B.

Secure the funding required to incorporate the new architecture into their existing networks.

C.

Set priorities by identifying the most valuable and critical assets and data on their networks.

D.

Request a statement of compliance from their IT vendors against the Zero Trust standard.

Full Access
Question # 5

Which Palo Alto Networks product offers a centrally managed firewall update process?

A.

SD_WAN

B.

Prisma SaaS

C.

Panorama

D.

WildFire

Full Access
Question # 6

Which of the following is an advantage of the Palo Alto Networks Next-Generation Firewall (NGFW)?

A.

Docker containers can be run on the hardware to add features.

B.

It identifies applications by port number and protocol.

C.

It is well positioned in the network to do more than provide access control.

D.

Customers can create their own mix of security vendor products.

Full Access
Question # 7

Which Next-Generation Firewall (NGFW) deployment model allows an organization to monitor traffic during evaluations without interruption to network traffic?

A.

Layer 2

B.

TAP mode

C.

virtual wire

D.

Layer 3

Full Access
Question # 8

Which deployment method is used to integrate a firewall to be inline in an existing network but does not support additional routing or switching?

A.

virtual wire

B.

TAP mode

C.

Layer 3

D.

Layer 2

Full Access
Question # 9

Which architecture is unique to Palo Alto Networks and results in no additional performance overhead when enabling additional features?

A.

multi-pass

B.

multiple-core threaded

C.

single-pass

D.

no-pass

Full Access
Question # 10

A Human Resources (HR) application has the URL of https://hr.company.com:4433/.

How should the "Service" column of the Security policy be set to match and permit this application?

A.

Define and then select a new custom Transmission Control Protocol (TCP) service with port 4433.

B.

Edit "service-https" to use port 4433.

C.

Set to "service-http".

D.

Set to "application-defaults," which will locate and match the HR application.

Full Access