Question 1
What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)
Question 2
What action would address the sub-optimal traffic path shown in the figure?
Key:
RN - Remote Network
SC - Service Connection
MU GW - Mobile User Gateway
Key:
RN - Remote Network
SC - Service Connection
MU GW - Mobile User Gateway
Question 3
Which two new file types are supported on the WF-500 in PAN-OS 9? (Choose two)
Question 4
A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.
Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)
Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)
Question 5
What are two advantages of the DNS Sinkholing feature? (Choose two.)