1. The Palo Alto Networks Cybersecurity Portfolio focuses on which three
principle technologies? (Choose three.)
A. securing operations response
B. securing the enterprise
C. securing third-party application access
D. securing the cloud
E. securing the internet of things Correct Ans - ABD
2. What are four components of the Palo Alto Networks Cybersecurity
Portfolio? (Choose four.)
A. Cortex DynamicDNS
B. Wildfire
C. Cortex XDR
D. OpenConnect
E. Prisma Access
F. Autofocus Correct Ans - BCEF
3. Which cloud-delivered security service provides instant access to
community-based threat data?
A. Prisma Saas
B. Autofocus
C. Unit 42
D. Cortex XOR Correct Ans - B
4. Which cloud-delivered security service provides security and
connectivity for branches and mobile users?
A. Cortex XSOAR
B. Cortex XOR
C. AutoFocus
D. Prisma Access Correct Ans - D
5. Which Palo Alto Networks Cybersecurity Portfolio product provides
access to applications from Palo Alto Networks, third parties, and
customers?
A. WildFire
B. Cortex Data Lake
,C. Network Security
D. Prisma Access Correct Ans - B
6. Which Palo Alto Networks firewall feature provides all the following
abilities?
• Stops malware, exploits, and ransomware before they can compromise
endpoints
• Provides protection while endpoints are online and offline, on network
and off
• Coordinates enforcement with network and cloud security to prevent
successful attacks
• Detects threats and automates containment to minimize impact
• Creates zero-day malware signatures with cloud-based threat analysis
• Integrates with Palo Alto Networks Cortex Data Lake
A. Cortex XDR
B. Prisma Saas
C. WildFire
D. AutoFocus Correct Ans - A
7. Which three management features does the Control Plane provide?
(Choose three .)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing Correct Ans - BCD
8. Which three data processing features does the data plane provide?
(Choose three .)
A. security processing
B. logging
C. reporting
D. firewall configuration
E. signature matching
F. network processing Correct Ans - AEF
, 9. What are three components of the Network Processing module? (Choose
three.)
A. QoS
B. NAT
C. App-ID
D. flow control
E. URL match
F. spyware Correct Ans - ABD
10. Which approach most accurately defines the Palo Alto Networks SP3
architecture?
A. prioritize first
B. sequential processing
C. scan it all, scan it once
D. Zero Trust segmentation platform Correct Ans - C
11. What is the result of using a stream-based architectural design?
A. superior performance
B. increased latency
C. detailed logging
D. increased functionality Correct Ans - A
12. Which security model does Palo Alto Networks recommend that you
deploy?
A. separation-of-trust
B. Zero Trust
C. trust-then-verify
D. never trust Correct Ans - B
13. The Zero Trust model is implemented to specifically inspect which type
of traffic?
A. east-west
B. north-south
C. left-right
D. up-down Correct Ans - A
14. What are the three main concepts of Zero Trust? (Choose three.)
A. All resources are accessed in a secure manner, regardless of location.
B. Access control is on a "need-to-know" basis and is strictly enforced.