<< Prev Question Next Question >>

Question 43/68

Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (68q)
Question 1: (Exhibit) What action would address the sub-optimal traffic ...
Question 2: A customer is designing a private data center to host their ...
Question 3: in which step of the Palo Alto Networks Five-Step Zero Trust...
Question 4: Which functionality is available to firewall users with an a...
Question 5: A potential customer requires an NGFW solution which enables...
Question 6: There are different Master Keys on Panorama and managed fire...
Question 7: When the Cortex Data Lake is sized for Traps Management Serv...
Question 8: Which security profile on the NGFW includes signatures to pr...
Question 9: What are two advantages of the DNS Sinkholing feature? (Choo...
Question 10: What are three key benefits of the Palo Alto Networks platfo...
Question 11: A customer is looking for an analytics tool that uses the lo...
Question 12: A customer is starting to understand their Zero Trust protec...
Question 13: Which CLI command will allow you to view latency, jitter and...
Question 14: What is the recommended way to ensure that firewalls have th...
Question 15: Which are the three mandatory components needed to run Corte...
Question 16: What three Tabs are available in the Detailed Device Health ...
Question 17: What are three purposes for the Eval Systems, Security Lifec...
Question 18: Which filtering criterion is used to determine users to be i...
Question 19: A customer with a legacy firewall architecture is focused on...
Question 20: A customer with a legacy firewall architecture is focused on...
Question 21: What two types of certificates are used to configure SSL For...
Question 22: In Panorama, which three reports or logs will help identify ...
Question 23: How do you configure the rate of file submissions to WildFir...
Question 24: Which statement is true about Deviating Devices and metrics?...
Question 25: The ability to prevent users from resolving internet protoco...
Question 26: Which statement best describes the business value of Palo Al...
Question 27: Which is the smallest Panorama solution that can be used to ...
Question 28: WildFire can discover zero-day malware in which three types ...
Question 29: Which Palo Alto Networks pre-sales tool involves approximate...
Question 30: Palo Alto Networks publishes updated Command-and-Control sig...
Question 31: Which three categories are identified as best practices in t...
Question 32: Which two tabs in Panorama can be used to identify templates...
Question 33: In PAN-OS 10.0 and later, DNS Security allows policy actions...
Question 34: When having a customer pre-sales call, which aspects of the ...
Question 35: What are two core values of the Palo Alto Network Security O...
Question 36: How often are the databases for Anti-virus. Application, Thr...
Question 37: Which selection must be configured on PAN-OS External Dynami...
Question 38: Which three of the following actions must be taken to enable...
Question 39: Which proprietary technology solutions will allow a customer...
Question 40: Which statement applies to Palo Alto Networks Single Pass Pa...
Question 41: Which three signature-based Threat Prevention features of th...
Question 42: Which three actions should be taken before deploying a firew...
Question 43: Select the BOM for the Prisma Access, to provide access for ...
Question 44: When the Cortex Data Lake is sized for Prisma Access mobile ...
Question 45: An administrator wants to justify the expense of a second Pa...
Question 46: Which domain permissions are required by the User-ID Agent f...
Question 47: How frequently do WildFire signatures move into the antiviru...
Question 48: What can be applied to prevent users from unknowingly downlo...
Question 49: Decryption port mirroring is now supported on which platform...
Question 50: Which license is required to receive weekly dynamic updates ...
Question 51: Which profile or policy should be applied to protect against...
Question 52: Which Palo Alto Networks security component should an admini...
Question 53: Which two configuration items are required when the NGFW nee...
Question 54: A price-sensitive customer wants to prevent attacks on a Win...
Question 55: The firewall includes predefined reports, custom reports can...
Question 56: XYZ Corporation has a legacy environment with asymmetric rou...
Question 57: When HTTP header logging is enabled on a URL Filtering profi...
Question 58: Which CLI command allows visibility into SD-WAN events such ...
Question 59: A client chooses to not block uncategorized websites. Which ...
Question 60: In an HA pair running Active/Passive mode, over which interf...
Question 61: A prospective customer currently uses a firewall that provid...
Question 62: Which two components must be configured within User-ID on a ...
Question 63: A customer is concerned about malicious activity occurring d...
Question 64: A customer has business-critical applications that rely on t...
Question 65: A customer requires protections and verdicts for portable ex...
Question 66: What is an advantage of having WildFire machine learning (ML...
Question 67: What helps avoid split brain in active / passive high availa...
Question 68: Which solution informs a customer concerned about zero-day t...