Palo Alto Networks publishes updated Command and Control signatures. How frequently should the related signatures schedule be set?
A. Once an hour
B. Once every minute
C. Once a week
D. Once a day
A customer is adopting Microsoft Office 365 but is concerned about the potential security exposure that such a move could mean. The security analyst suggests using Aperture and the Palo Alto Network firewall together to provide data and network security.
What are the two reasons this solution has been suggested? (Choose two.)
A. The firewall secures data in transit between the network and the cloud.
B. Aperture prevents users from using non-sanctioned SaaS applications.
C. The firewall scans data that resides in the cloud for malware.
D. Aperture scans data that resides in the cloud for sensitive information.
An SE is preparing an SLR report for a school and wants to emphasize URL filtering capabilities because the school is concerned that its students are accessing inappropriate websites. The URL categories being chosen by default in the report are not highlighting these types of websites.
How should the SE show the customer the firewall can detect that these websites are being accessed?
A. Remove unwanted categories listed under "High Risk" and use relevant information
B. Create a footnote within the SLR generation tool
C. Edit the Key-Findings text to list the other types of categories that may be of interest
D. Produce the report and edit the PDF manually
When a customer creates a new SLR report, what is the first step in generating a proper SLR report once logged in to the Partner Portal?
A. Click the Track my deals button to view your open Opportunities.
B. Scroll down and click the New Security Lifecycle Review button.
C. Click the Select files... button and find the relevant statsdump file on your local machine and click Upload.
D. Select the appropriate Opportunity.
A price sensitive customer wants to prevent attacks on a windows 2008 Virtual Server. The server will max out at 100Mbps but needs to have 45,000 sessions to connect to multiple hosts within a data center.
Which VM instance should be used to secure the network by this customer?
A. VM-200
B. VM-100
C. VM-300
D. VM-50
What is the recommended way to ensure that firewalls have the most current set of signatures for up-todate protection?
A. Store updates on an intermediary server and point all the firewalls to it
B. Monitor update announcements and manually push updates to firewalls
C. Utilize dynamic updates with an aggressive update schedule
D. Run a Perl script to regularly check for updates and alert when one in released
What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud? (Choose three.)
A. Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat Alliance
B. Palo Alto Networks AutoFocus generated Correlation Objects
C. Palo Alto Networks Next Generation Firewalls deployed with Wildfire Analysis Security Profiles
D. WF-500 configured as private clouds for privacy concerns
E. Palo Alto Networks non-firewall products, like Traps and Aperture
An endpoint, inside an organization, is infected with known malware. The malware attempts to make a command and control connection to a CandC server via the destination IP address.
Which mechanism prevent this connection from succeeding?
A. DNS Sinkholing
B. DNS Proxy
C. Anti-Spyware Signatures
D. Wildfire Analysis
Which two tabs in Panorama can be used to identify templates to define a common base configuration? (Choose two)
A. Monitor Tab
B. Network Tab
C. Device Tab
D. Objects Tab
E. Policies Tab
Which three application options can be selected in the security policy rule? (Choose three.)
A. Application Group
B. Individual Application
C. Application Risk
D. Application Filter
E. Application Category