Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?
Which three categories are identified as best practices in the Best Practice Assessment tool? (Choose three.)
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)
Which three platform components can identify and protect against malicious email links? (Choose three.)
Which three signature-based Threat Prevention features of the firewall are informed by intelligence from the Threat Intelligence Cloud? (Choose three.)
What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)
Which solution informs a customer concerned about zero-day targeted attacks whether an attack is specifically targeted at its property?
A customer is seeing an increase in the number of malicious files coming in from undetectable sources in their network. These files include doc and .pdf file types.
The customer uses a firewall with User-ID enabled
Which feature must also be enabled to prevent these attacks?
A prospective customer currently uses a firewall that provides only Layer 4
inspection and protections. The customer sees traffic going to an external destination, port 53, but cannot determine what Layer 7 application traffic is going over that port
Which capability of PAN-OS would address the customer's lack of visibility?
Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)