Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which overlay protocol must a customer premises equipment (CPE) device support when terminating a Partner Interconnect-based Colo-Connect in Prisma Access?

A.

Geneve

B.

IPSec

C.

GRE

D.

DTLS

Full Access
Question # 5

Which feature can help address a customer concern about the length of time it takes to update their SaaS-allowed IP addresses while onboarding to Prisma Access?

A.

Dynamic IP pooling

B.

DNS-based load balancing

C.

Traffic steering

D.

Dedicated IP addresses

Full Access
Question # 6

Which statement applies when enabling multitenancy in Prisma Access (Managed by Panorama)?

A.

Service connection licenses will be assigned only to the first tenant, and these service connections can be shared with the other tenants.

B.

A single tenant cannot consist solely of mobile users or solely of remote networks.

C.

Each tenant is allocated its own dedicated Prisma Access instances, with compute resources that are not shared across tenants.

D.

There is flexibility to manage different tenants using separate Panoramas, which allows for better organization and management of the multiple tenants.

Full Access
Question # 7

An engineer has configured a new Remote Networks connection using BGP for route advertisements. The IPSec tunnel has been established, but the BGP peer is not up.

Which two elements must the engineer validate to solve the issue? (Choose two.)

A.

Secret

B.

MRAI Timers

C.

Peer AS Number

D.

Advertise Default Route Checkbox

Full Access
Question # 8

What is the flow impact of updating the Cloud Services plugin on existing traffic flows in Prisma Access?

A.

They willexperience latency during the plugin upgrade process.

B.

They will automatically terminate when the upgrade begins.

C.

They will be unaffected because the plugin upgrade is transparent to users.

D.

They will be unaffected only if Panorama is deployed in high availability (HA) mode.

Full Access
Question # 9

Which policy configuration in Prisma Access Browser (PAB) will protect an organization from malicious BYOD and minimize the impact on the user experience?

A.

One that blocks file exchange

B.

One for session recording

C.

One that blocks elements such as screen scrapers

D.

One that allows access to applications with data masking or watermarking

Full Access
Question # 10

When using the traffic replication feature in Prisma Access, where is the mirrored traffic directed for analysis?

A.

Specified internal security appliance

B.

Dedicated cloud storage location

C.

Panorama

D.

Strata Cloud Manager (SCM)

Full Access
Question # 11

Which feature within Strata Cloud Manager (SCM) allows an operations team to view applications, threats, and user insights for branch locations for both NGFW and Prisma Access simultaneously?

A.

Command Center

B.

Log Viewer

C.

Branch Site Monitor

D.

SASE Health Dashboard

Full Access
Question # 12

What is the impact of selecting the “Disable Server Response Inspection” checkbox after confirming that a Security policy rule has a threat protection profile configured?

A.

Only HTTP traffic from the server to the client will bypass threat inspection.

B.

The threat protection profile will override the 'Disable Server Response Inspection1 only for HTTP traffic from the server to the client.

C.

All traffic from the server to the client will bypass threat inspection.

D.

The threat protection profile will override the 'Disable Server Response Inspection1 for all traffic from the server to the client.

Full Access
Question # 13

In addition to creating a Security policy, how can an AI Access Security be used to prevent users from uploading financial information to ChatGPT?

A.

Apply File Blocking to stop file uploads containing financial information.

B.

Configure an Enterprise DLP rule to block uploads containing financial information.

C.

Add the ChatGPT domains using URL Filtering to block uploads containing financial information.

D.

Apply a vulnerability profile to stop attempts to exploit system flaws or gain unauthorized access to financial systems.

Full Access
Question # 14

How can an engineer use risk score customization in SaaS Security Inline to limit the use of unsanctioned SaaS applications by employees within a Security policy?

A.

Lower the risk score of sanctioned applications and increase the risk score for unsanctioned applications.

B.

Increase the risk score for all SaaS applications to automatically block unwanted applications.

C.

Build an application filter using unsanctioned SaaS as the category.

D.

Build an application filter using unsanctioned SaaS as the characteristic.

Full Access
Question # 15

An intern is tasked with changing the Anti-Spyware Profile used for security rules defined in the GlobalProtect folder. All security rules are using the Default Prisma Profile. The intern reports that the options are greyed out and cannot be modified when selecting the Default Prisma Profile.

Based on the image below, which action will allow the intern to make the required modifications?

A.

Request edit access for the GlobalProtect scope.

B.

Change the configuration scope to Prisma Access and modify the profile group.

C.

Create a new profile, because default profile groups cannot be modified.

D.

Modify the existing anti-spyware profile, because best-practice profiles cannot be removed from a group.

Full Access