Question 1

What are three purposes for the Eval Systems, Security Lifecycle Reviews and Prevention Posture Assessment tools? (Choose three.)
  • Question 2

    What action would address the sub-optimal traffic path shown in the figure?
    Key:
    RN - Remote Network
    SC - Service Connection
    MU GW - Mobile User Gateway
  • Question 3

    Which two new file types are supported on the WF-500 in PAN-OS 9? (Choose two)
  • Question 4

    A customer is concerned about malicious activity occurring directly on their endpoints and will not be visible to their firewalls.
    Which three actions does the Traps agent execute during a security event, beyond ensuring the prevention of this activity? (Choose three.)
  • Question 5

    What are two advantages of the DNS Sinkholing feature? (Choose two.)