Which three features are used to prevent abuse of stolen credentials? (Choose three.)
Which built-in feature of PAN-OS allows the NGFW administrator to create a policy that provides autoremediation for anomalous user behavior and malicious activity while maintaining user visibility?
Which two email links, contained in SMTP and POP3, can be submitted from WildFire analysis with a WildFire subscription? (Choose two.)
Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?
Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?
What three Tabs are available in the Detailed Device Health on Panorama for hardware-based firewalls? (Choose three.)
Which CLI allows you to view the names of SD-WAN policy rules that send traffic to the specified virtual SD-WAN interface, along with the performance metrics?
A)
B)
C)
D)
Which two configuration elements can be used to prevent abuse of stolen credentials? (Choose two.)
Which proprietary technology solutions will allow a customer to identify and control traffic sources regardless of internet protocol (IP) address or network segment?
Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)
Which CLI command will allow you to view latency, jitter and packet loss on a virtual SD-WAN interface?
A)
B)
C)
D)
In which two cases should the Hardware offering of Panorama be chosen over the Virtual Offering? (Choose two.)
Which two methods are used to check for Corporate Credential Submissions? (Choose two.)
In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)
A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)