Cortex Data Lake - Answer Collects, integrates, and normalizes data across your
security infrastructure.
Simplifies secops with apps built on Cortex.
Augmented with data from WildFire, AutoFocus/MineMeld, and Unit 42
Cortex XDR - Answer Set of tools that work with CDL to identify threats manually.
Determines root causes of security events and responds to events.
NGFW - Answer Secure the enerprise with a prevention focused architecture and easy
to use/deploy integrations.
DNS Security - Answer Utilizes predictive analytics, machine learning, and automation
to block attacks that use DNS.
Makes malicious domain information available to your NGFW collected from WildFire,
Unit 42, URL filtering, and Cyber threat alliance
WildFire - Answer Automatically prevents zero day exploits and malware
Utilizes shared community sourced threat data and advanced analysis.
Automatically delivers protections about every 5 minutes.
AutoFocus - Answer Brings speed consistency, and precision to threat investigation.
Provides instant access to community-based threat data from Unit 42.
Traps - Answer Advanced endpoint protection
Threat Prevention - Answer Automatically stops vuln exploits with IPS capabilities,
offers inline malware protection, and blocks outbound command and control traffic.
Combined with Wildfire and URL filtering, orgs are protected at every stage of the attack
life cycle
Panorama - Answer Enterprise level firewall management solution
MineMeld - Answer Open source app that streamlines aggregation, enforcement, and
sharing of threat intelligence
, Expedition - Answer Free, virtual appliance that helps convert firewall configs from other
vendors
VM-Series NGFW - Answer Available for many public and private cloud technologies
Prisma SaaS - Answer Provides complete visibility and granular enforcement across all
user, folder, and file activity within sanctioned SaaS apps
Prisma Access - Answer PAN NGFW delivered as a service to help automate/speed up
scaling/feature adoption
Prisma Cloud - Answer Provides security personnel with unmatched insight into the
threats detected in their environment
Cortex Data Lake - Answer Cloud delivered logging service
Cortex XDR - Analytics - Answer Enables you to detect post intrusion activity
What is App-ID? - Answer Scanning of traffic to identify the application that is involved,
regardless of the protocol or port number used
What is Content-ID? - Answer Scanning of traffic for security threats:
- Data leak prevention
- URL filtering
- Virus
- Spyware
- Unwanted file transfers
- Special data patterns
- Vuln attacks
- Browsing access
What is User-ID? - Answer Matching of a user to an IP address (or multiple)
What do security profiles use to identify threats? - Answer signatures
How are unidentified threats identified? - Answer Through wildfire analysis, a signature
is created for uknown threats
Where are security policies located in a rule? - Answer Rule -> Actions -> Profile
Settings
How many zones can an interface be assigned to? - Answer One of the same type
How are sessions defined on PAN FW? - Answer Source and destination zones
What is intrazone traffic? - Answer Traffic within the same zone