Join the discussion
Question 1/129
When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?
Correct Answer: B
Add Comments
- Other Question (129q)
- Q1. When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log siz...
- Q2. Which methods are used to check for Corporate Credential Submissions? (Choose three.)...
- Q3. A customer with a legacy firewall architecture is focused on port and protocol level secur...
- Q4. What are three sources of malware sample data for the Threat Intelligence Cloud? (Choose t...
- Q5. An administrator wants to justify the expense of a second Panorama appliance for HA of the...
- Q6. Which two products can send logs to the Cortex Data Lake? (Choose two.)...
- Q7. Which statement describes how Palo Alto Networks can eliminate implicit user trust, regard...
- Q8. Which three settings must be configured to enable Credential Phishing Prevention? (Choose ...
- Q9. A customer requires protections and verdicts for portable executable (PE) and executable a...
- Q10. Which three components are specific to the Query Builder found in the Custom Report creati...
- Q11. Which two features can be enabled to support asymmetric routing with redundancy on a Palo ...
- Q12. Which three considerations should be made prior to installing a decryption policy on the N...
- Q13. A prospective customer was the victim of a zero-day attack that compromised specific emplo...
- Q14. Match the WildFire Inline Machine Learning Model to the correct description for that model...
- Q15. What are three best practices for running an Ultimate Test Drive (UTD)? (Choose three.)...
- Q16. Which four actions can be configured in an Anti-Spyware profile to address command-and-con...
- Q17. A customer requires protections and verdicts for PE (portable executable) and ELF (executa...
- Q18. Which three items contain information about Command-and-Control (C2) hosts? (Choose three....
- Q19. In Panorama, which three reports or logs will help identify the inclusion of a host source...
- Q20. WildFire can discover zero-day malware in which three types of traffic? (Choose three)...
- Q21. Which three policies or certificates must be configured for SSL Forward Proxy decryption? ...
- Q22. The Palo Ao Networks Cloud Identity Engino (CIE) includes which service that supports iden...
- Q23. The firewall includes predefined reports, custom reports can be built for specific data an...
- Q24. What helps avoid split brain in active/passive HA pair deployment?...
- Q25. If a Palo Alto Networks Next-Generation Firewall (NGFW) already has Advanced Threat Preven...
- Q26. Which two network events are highlighted through correlation objects as potential security...
- Q27. Which two tabs in Panorama can be used to identify templates to define a common base confi...
- Q28. Which certificate can be used to ensure that traffic coming from a specific server remains...
- Q29. A potential customer requires an NGFW solution that enables high-throughput, low-latency n...
- Q30. Which two components must to be configured within User-ID on a new firewall that has been ...
- Q31. True or False: PAN-DB is a service that aligns URLs with category types and is fed to the ...
- Q32. Palo Alto Networks publishes updated Command and Control signatures. How frequently should...
- Q33. A prospective customer currently uses a firewall that provides only Layer 4 inspection and...
- Q34. Which three application options can be selected in the security policy rule? (Choose three...
- Q35. What are three key benefits of the Palo Alto Networks platform approach to security? (Choo...
- Q36. Which security profile on the NGFW includes signatures to protect you from brute force att...
- Q37. How often are regularly scheduled update for the Anti-virus Application, Threats, and Wild...
- Q38. Which four actions can be configured in an Anti-Spyware profile to address command-and-con...
- Q39. There are different Master Keys on Panorama and managed firewalls. What is the result if a...
- Q40. When a customer creates a new SLR report, what is the first step in generating a proper SL...
- Q41. Which four steps of the cyberattack lifecycle dose the Palo Alto Networks platform present...
- Q42. What are two benefits of the sinkhole Internet Protocol (IP) address that DNS Security sen...
- Q43. Which two configuration elements can be used to prevent abuse of stolen credentials? (Choo...
- Q44. WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivi...
- Q45. Which two methods can be used to verify firewall connectivity to AutoFocus? (Choose two.)...
- Q46. The need for a file proxy solution, virus and spyware scanner, a vulnerability scanner, an...
- Q47. A company has deployed the following * VM-300 firewalls in AWS * endpoint protection with ...
- Q48. Which Palo Alto Networks security platform component should an administrator use to extend...
- Q49. A customer has business-critical applications that rely on the general web-browsing applic...
- Q50. Which three categories are identified as best practices in the Best Practice Assessment to...
- Q51. Which two actions can be taken to enforce protection from brute force attacks in the secur...
- Q52. What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to ret...
- Q53. Which license is required to receive weekly dynamic updates to the correlation objects on ...
- Q54. Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis...
- Q55. As you prepare to scan your Amazon S3 account, what enables Prisma service permission to a...
- Q56. Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the spe...
- Q57. Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-W...
- Q58. How frequently do WildFire signatures move into the antivirus database?...
- Q59. Which three methods used to map users to IP addresses are supported in Palo Alto Networks ...
- Q60. Which User-ID method maps IP addresses to usernames for users connecting through an 802.1x...
- Q61. Which two of the following does decryption broker provide on a NGFW? (Choose two.)...
- Q62. Which two interface types can be associated to a virtual router? (Choose two.)...
- Q63. Drag and Drop Question Match the WildFire Inline Machine Learning Model to the correct des...
- Q64. When a malware-infected host attempts to resolve a known command-and-control server, the t...
- Q65. The botnet report displays a confidence score of 1 to 5 indicating the likelihood of a bot...
- Q66. What are the three possible verdicts in WildFire Submissions log entries for a submitted s...
- Q67. A customer is concerned about zero-day targeted attacks against its intellectual property....
- Q68. How often are the databases for Anti-virus. Application, Threats, and WildFire subscriptio...
- Q69. Which CLI commands allows you to view SD-WAN events such as path selection and path qualit...
- Q70. Which two components must be configured within User-ID on a new firewall that has been imp...
- Q71. An Administrator needs a PDF summary report that contains information compiled from existi...
- Q72. What are the two group options for database when creating a custom report? (Choose two)...
- Q73. What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Po...
- Q74. In an HA pair running Active/Passive mode, over which interface do the dataplanes communic...
- Q75. Which are the three mandatory components needed to run Cortex XDR? (Choose three.)...
- Q76. What are the three possible verdicts in WildFire Submissions log entries for a submitted s...
- Q77. Which Palo Alto Networks security component should an administrator use to and NGFW polici...
- Q78. Which solution informs a customer concerned about zero-day targeted attacks whether an att...
- Q79. Which three actions should be taken before deploying a firewall evaluation unit in the cus...
- Q80. What is the basis for purchasing Cortex XDR licensing?...
- Q81. Which four steps of the cyberattack lifecycle does the Palo Alto Networks Security Operati...
- Q82. What are the three benefits of the Palo Alto Networks migration tool? (Choose three.)...
- Q83. Which three activities can the botnet report track? (Choose three.)...
- Q84. A customer next-generation firewall (NGFW) proof-of-concept (POC) and final presentation h...
- Q85. What helps avoid split brain in active / passive high availability (HA) pair deployment?...
- Q86. A WildFire subscription is required for which two of the following activities? (Choose two...
- Q87. What are two presales selling advantages of using Expedition? (Choose two.)...
- Q88. WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivi...
- Q89. Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the spe...
- Q90. Which three settings must be configured to enable Credential Phishing Prevention? (Choose ...
- Q91. A customer is seeing an increase in the number of malicious files coming in from undetecta...
- Q92. DNS sinkholing helps identify infected hosts on the protected network using DNS traffic in...
- Q93. Which configuration creates the most comprehensive "best-practice" Anti Spyware profile to...
- Q94. Which selection must be configured on PAN-OS External Dynamic Lists to support MineMeld in...
- Q95. A customer is seeing an increase in the number of malicious files coming in from undetecta...
- Q96. Which two statements correctly describe what a Network Packet Broker does for a Palo Alto ...
- Q97. Which domain permissions are required by the User-ID Agent for WMI Authentication on a Win...
- Q98. An endpoint, inside an organization, is infected with known malware that attempts to make ...
- Q99. Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remot...
- Q100. Which two components must be configured within User-ID on a new firewall that has been imp...
- Q101. Given the following network diagram, an administrator is considering the use of Windows Lo...
- Q102. Which two features are found in a next-generation firewall but are absent in a legacy fire...
- Q103. A client chooses to not block uncategorized websites. Which two additions should be made t...
- Q104. Which three features are used to prevent abuse of stolen credentials? (Choose three.)...
- Q105. Which of the following statements is valid with regard to Domain Name System (DNS) sinkhol...
- Q106. When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log siz...
- Q107. What is an advantage public cloud WildFire has over the private WildFire appliance?...
- Q108. Which two tabs in Panorama can be used to identify templates to define a common base confi...
- Q109. Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-W...
- Q110. As you prepare to scan your Amazon S3 account, what enables Prisma service permission to a...
- Q111. What are five benefits of Palo Alto Networks NGFWs (Next Generation Firewalls)? (Select th...
- Q112. Which two of the following are required when configuring the Domain Credential Filter meth...
- Q113. In an HA pair running Active/Passive mode, over which interface do the dataplanes communic...
- Q114. Which of the following statements is valid with regard to Domain Name System (DNS) sinkhol...
- Q115. Which three script types can be analyzed in WildFire? (Choose three)...
- Q116. What can be applied to prevent users from unknowingly downloading malicious file types fro...
- Q117. When log sizing is factored for the Cortex Data Lake on the NGFW, what is the average log ...
- Q118. Which three of the following actions must be taken to enable Credential Phishing Preventio...
- Q119. Which functionality is available to firewall users with an active Threat Prevention subscr...
- Q120. A customer is concerned about malicious activity occurring directly on their endpoints and...
- Q121. Which statement best describes the business value of Palo Alto Networks Zero Touch Provisi...
- Q122. The ability to prevent users from resolving internet protocol (IP) addresses to malicious,...
- Q123. Which two configuration items are required when the NGFW needs to act as a decryption brok...
- Q124. A price-sensitive customer wants to prevent attacks on a Windows Virtual Server. The serve...
- Q125. Because of regulatory compliance a customer cannot decrypt specific types of traffic. Whic...
- Q126. Palo Alto Networks publishes updated Command-and-Control signatures. How frequently should...
- Q127. How do you configure the rate of file submissions to WildFire in the NGFW?...
- Q128. For customers with high bandwidth requirements for Service Connections, what two limitatio...
- Q129. A service provider has acquired a pair of PA-7080s for its data center to secure its custo...

[×]
Download PDF File
Enter your email address to download PaloaltoNetworks.PSE-Strata.v2024-05-25.q129.pdf