Paloalto networks security operating platform is designed for which 3
purposes? Correct Ans - consume innovations quickly
focus on what matters
prevent successful cyberattacks
which item is not one of the six primary components of the palo alto
networks security operating platform Correct Ans - WildFire
Which cloud delivered security service provides instant access to
community based threat data? Correct Ans - AutoFocus
which cloud delivered security services provides security for branches and
mobile users? Correct Ans - GlobalProtect
Which palo alto networks security operating platform component
perovides access to apps from palo alto networks, third parties, and
customers? Correct Ans - Application Framework
Which palo alto networks firewall feature provides all of the following:
stops malware, exploits
protection while endpoints are online or offline
detect threats.... Correct Ans - Traps
Which management features does the control plane provide? Correct
Ans - logging
reporting
firewall configuration
which 3 data processing features does the data plane provide? Correct
Ans - network processing
security processing
signature matching
what are 3 components of the network processing module? Correct
Ans - QoS
NAT
, Flow control
which approach most accurately defines that PA SP3 architecture?
Correct Ans - scan it all, scan it once
what is the result of using a stream-based design of architecture?
Correct Ans - superior performance
which security model does pa networks recommend that you deploy?
Correct Ans - zero trust
the zero trust model is implemented to specifically address which type of
traffic? Correct Ans - east-west
what are the 3 main concepts of zero trust? Correct Ans - all
resources are accessed in a secure manner
access control is on a need-to-know basis
all traffic is logged and inspected
which 2 statements are true about zero trust Correct Ans - traffic is
inspected laterally
traffic is inspected east-west
which 3 pa networks products secure your network? Correct Ans -
aperture
url filtering
wildfire
blocking just one stage of the cyber-attack lifecycle is all the is needed to
protect a company from attack? Correct Ans - true
what are 2 stages of the cyber-attack lifecycle Correct Ans -
weaponization and delivery
command and control
command and control can be prevented through which two methods?
Correct Ans - dns sinkholing
url filtering