How often are the databases for Anti-virus. Application, Threats, and WildFire subscription updated?
Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)
Within the Five-Step Methodology of Zero Trust, in which step would application access and user access be defined?
Match the functions to the appropriate processing engine within the dataplane.
WildFire can discover zero-day malware in which three types of traffic? (Choose three)
WildFire machine learning (ML) for portable executable (PE) files is enabled in the antivirus profile and added to the appropriate firewall rules in the profile. In the Palo Alto Networks WildFire test av file, an attempt to download the test file is allowed through.
Which command returns a valid result to verify the ML is working from the command line.
in which step of the Palo Alto Networks Five-Step Zero Trust Methodology would an organization's critical data, applications, assets, and services (DAAS) be identified?
Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?
What action would address the sub-optimal traffic path shown in the figure?
Key:
RN - Remote Network
SC - Service Connection
MU GW - Mobile User Gateway
Which profile or policy should be applied to protect against port scans from the internet?