The Palo Alto Networks Cybersecurity Portfolio focuses on which three principle technologies? - ✔✔
Securing the operations response
Securing the enterprise
Securing the cloud
What are four components of the Palo Alto Networks Cybersecurity Portfolio? - ✔✔WildFire
Cortex XDR
Prisma Access
AutoFocus
Which cloud-delivered security service provides instant access to community-based threat data? - ✔✔
AutoFocus
Which cloud-delivered security service provides security and connectivity for branches and mobile
users? - ✔✔Prisma Access
Which Palo Alto Networks cybersecurity portfolio product provides access to applications from Palo Alto
Networks, third parties, and customers? - ✔✔Cortex Data Lake
Which Palo Alto Networks firewall feature provides all the following abilities?
Stops malware, exploits, and ransomware before they can compromise endpoints
Provides protection while endpoints are online and offline, on network and off
,Coordinates enforcement with network and cloud security to prevent successful attacks
Detects threats and automates containment to minimize impact
Creates zero-day malware signatures with cloud-based threat analysis
Integrates with Palo Alto Networks Cortex Data Lake - ✔✔Cortex XDR
Which three management features does the Control Plane provide? - ✔✔Logging
Reporting
Firewall configuration
Which three data processing features does the data plane provide? - ✔✔Security processing
Signature matching
network processing
What are three components of the Network Processing module? - ✔✔QoS
NAT
Flow Control
Which approach most accurately defines the Palo Alto Networks SP3 architecture - ✔✔Scan it all, scan
it once
What is the result of using a stream-based architectural design - ✔✔Superior performance
, Which security model does Palo Alto Networks recommend that you deploy - ✔✔Zero trust
The Zero Trust model is implemented to specifically inspect which type of traffic? - ✔✔East-west
What are the three main concepts of Zero Trust? - ✔✔All Resources are accessed in a secure manner,
regardless of location
Access control is on a "need-to-know" basis and is strictly enforced
All traffic is logged and inspected
Which two statements are true about the Zero Trust model? - ✔✔Traffic is inspected laterally
Traffic is inspected east-west
Which three Palo Alto Networks products secure your network? - ✔✔Prisma SaaS
URL Filtering
WildFire
True or false: Blockage of just one stage in the cyberattack lifecycle will protect a company's network
from attack. - ✔✔True
What are two stages of the cyberattack lifecycle? - ✔✔Weaponization and delivery
Command and control
Command and control can be prevented through which two methods? - ✔✔DNS sinkholing