MultipleChoice
XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy.
Which two features must be enabled to meet the customer’s requirements? (Choose two.)
OptionsMultipleChoice
Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
OptionsMultipleChoice
A customer is worried about unknown attacks, but due to privacy and regulatory issues, won't implement SSL decrypt.
How can the platform still address this customer's concern?
OptionsMultipleChoice
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
OptionsMultipleChoice
A client chooses to not block uncategorized websites.
Which two additions should be made to help provide some protection? (Choose two.)
OptionsMultipleChoice
Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)
OptionsMultipleChoice
Which functionality is available to firewall users with an active Threat Prevention subscription, but no WildFire license?
OptionsMultipleChoice
Which configuration creates the most comprehensive ''best-practice'' Anti Spyware profile to prevent command and Control traffic?
OptionsMultipleChoice
Which profile or policy should be applied to protect against port scans from the internet?
Options