A. securing operations response
B. securing the enterprise
D. securing the cloud
The Palo Alto Networks Cybersecurity Portfolio focuses on which three
... [Show More] principle
technologies? (Choose three.)
A. securing operations response
B. securing the enterprise
C. securing third-party application access
D. securing the cloud
E. securing the internet of things
B. WildFire
C. Cortex XDR
E. Prisma Access
F. AutoFocus
What are four components of the Palo Alto Networks Cybersecurity Portfolio?
(Choose four.)
A. Cortex DynamicDNS
B. WildFire
C. Cortex XDR
D. OpenConnect
E. Prisma Access
F. AutoFocus
B. AutoFocus
Which cloud-delivered security service provides instant access to community-based threat data?
A. Prisma SaaS
B. AutoFocus
C. Unit 42
D. Cortex XDR
D. Prisma Access
Which cloud-delivered security service provides security and connectivity for branches and mobile
users?
A. Cortex XSOAR
B. Cortex XDR
C. AutoFocus
D. Prisma Access
B. Cortex Data Lake
Which Palo Alto Networks Cybersecurity Portfolio product provides access to applications from
Palo Alto Networks, third parties, and customers?
A. WildFire
B. Cortex Data Lake
C. Network Security
D. Prisma Access
A. Cortex XDR
Which Palo Alto Networks firewall feature provides all the following abilities?
• Stops malware, exploits, and ransomware before they can compromise endpoints
• Provides protection while endpoints are online and offline, on network and off
• Coordinates enforcement with network and cloud security to prevent
successful attacks
• Detects threats and automates containment to minimize impact
• Creates zero-day malware signatures with cloud-based threat analysis
• Integrates with Palo Alto Networks Cortex Data Lake
A. Cortex XDR
B. Prisma SaaS
C. WildFire
D. AutoFocus
B. logging
C. reporting
D. firewall configuration
Which three management features does the control plane provide? (Choose three.)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing
A. security processing
E. signature matching
F. network processing
Which three data processing features does the data plane provide? (Choose three.)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing
A. QoS
B. NAT
D. flow control
What are three components of the Network Processing module? (Choose three.)
A. QoS
B. NAT
C. App-ID
D. flow control
E. url match
F. spyware
C. scan it all, scan it once
Which approach most accurately defines the Palo Alto Networks SP3 architecture?
A. prioritize first
B. sequential processing
C. scan it all, scan it once
D. Zero Trust segmentation platform
A. superior performance
What is the result of using a stream-based architectural design?
A. superior performance
B. increased latency
C. detailed logging
D. increased functionality
B. Zero Trust
Which security model does Palo Alto Networks recommend that you deploy?
A. separation-of-trust
B. Zero Trust
C. trust-then-verify
D. never trust
A. east-west
The Zero Trust model is implemented to specifically inspect which type oftraffic?
A. east-west
B. north-south
C. left-right
D. up-down [Show Less]