How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?
A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)
The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?
When the Cortex Data Lake is sized for Prisma Access mobile users, what is a valid log size range you would use per day. per user?
Which are the three mandatory components needed to run Cortex XDR? (Choose three.)
When log sizing is factored for the Cortex Data Lake on the NGFW, what is the average log size used in calculation?
What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?
Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)
Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?
Match the WildFire Inline Machine Learning Model to the correct description for that model.
A customer is designing a private data center to host their new web application along with a separate headquarters for users.
Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?
Which two features are key in preventing unknown targeted attacks? (Choose two)
Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?
Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)