What are three benefits of SD-WAN infrastructure? (Choose three.)
Which of the following is a service that allows you to control permissions assigned to users in order for them to access and utilize cloud resources?
What are the two most prominent characteristics of the malware type rootkit? (Choose two.)
Which type of IDS/IPS uses a baseline of normal network activity to identify unusual patterns or levels of network activity that may be indicative of an intrusion attempt?
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?
Under which category does an application that is approved by the IT department, such as Office 365, fall?
In which situation would a dynamic routing protocol be the quickest way to configure routes on a router?
In which phase of the cyberattack lifecycle do attackers establish encrypted communication channels back to servers across the internet so that they can modify their attack objectives and methods?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next- generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Which technique uses file sharing or an instant messenger client such as Meebo running over Hypertext Transfer Protocol (HTTP)?