Question 6

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture.
What are two steps in this process? (Choose two.)
  • Question 7

    Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
  • Question 8

    Select the BOM for the Prisma Access, to provide access for 5500 mobile users and 10 remote locations (100Mbps each) for one year, including Base Support and minimal logging. The customer already has 4x PA5220r 8x PA3220,1x Panorama VM for 25 devices.
  • Question 9

    Which are the three mandatory components needed to run Cortex XDR? (Choose three.)
  • Question 10

    DNS sinkholing helps identify infected hosts on the protected network using DNS traffic in situations where the firewall cannot see the infected client's DNS query (that is, the firewall cannot see the originator of DNS query) Which of the following Statements is true?