Sie sind auf Seite 1von 5

What is the difference between a BPA Report for a registered opportunity and a report

without a registered opportunity?


The report for a registered opportunity is free, but there is a fee for generating a report
when there is no registered opportunity.
There is no difference between the two reports.
Reports for registered opportunities include information about licensing entered when
the opportunity was registered.
Reports for registered opportunities are based on Tech Support Files and reports outside
of registered opportunities are based on Prospect Tech Support Files.

Which file should be used to provide data for a BPA or Heatmap?


SaaS Risk Assessment report
Tech Support File
exported config file
exported Traffic log csv

Which feature or option helps find the security rule that allowed traffic from a particular
application at a particular time?
Prisma SaaS Risk Assessment Report
BPA heatmap
log at NGFW Monitor > Traffic
WildFire® verdict

What does WildFire® do when a file or URL is uploaded to it by an NGFW?


WildFire determines a verdict of Benign, Grayware, Malware, or Phishing.
WildFire provides a WildFire Analysis Profile back to the NGFW to be attached to the
rule that allowed the file or URL.
WildFire updates PAN-OS® software with its analysis and the NGFW gets that
information the next time it updates PAN-OS® software.
WildFire replies to the NGFW with a hash of a signature that matches the sent file or
URL.
Which tool would provide an existing NGFW customer configuration analysis and
recommendations based on best practice checks?
Cortex XDR
Prisma SaaS
NGFW Custom reports
BPA

Which three options are firewall configuration steps to prepare for SLR data collection?
(Choose three.)
From Device > Setup > Interfaces > Management, edit Management Interface Settings
and add an address and default gateway.
From Device > Setup > Services, edit DNS settings and set the update server to
updates.paloaltonetworks.com.
Receive license keys from the license server.
From Objects > Security Profiles > Antivirus, edit the Antivirus Profile and set its
WildFire® action to "reset both" for all decoders.
From Device > Setup > Services, edit DNS settings and set the update server to the
address of one of the existing firewalls.

Which part of the Palo Alto Networks Security Operating Platform helps customers
accelerate their consumption of innovative cloud security offerings?
Prisma SaaS
Cortex Hub
Cortex XDR
Generation Alpha Firewall

Which file should be uploaded to the Security Lifecycle Review tool?


SaaS Risk Assessment report
Stats Dump file
exported config file
SLR report csv

Which product protects against threats moving between servers in the cloud?
Prisma SaaS
Prisma Access
next-generation firewall VM
Cortex XDR
For Tap mode installation of an NGFW to collect data for an SLR, where is the NGFW
placed?
between the internet and existing perimeter security competitive firewalls
between an internal database server and its backup server
off a SPAN port of a firewall that will be the competition for the NGFW
off a SPAN port of a switch that sees all north-south traffic of the network to be
reviewed

How can User-ID connectivity be verified for an NGFW?


Check WMI logs.
Check traffic load on the network's LDAP server.
Check Device > User Identification > User Mapping > Server Monitoring.
Check the CPU load on the network's domain controller.

Which answer describes Security Lifecycle Reviews?


They are limited to use with competitive security products documented as compatible
with SLR data collection.
They provide value only after a customer purchases Palo Alto Networks security
products.
They provide value only before a customer purchases Palo Alto Networks security
products.
They are based on non-intrusive collection of data.

Which process yields a Tech Support File that is ready for upload?
From Monitor > PDF Reports, select Tech Support File, and specify a location to save
the file.
Click Device > Support > Generate Tech Support File from the NGFW web interface.
Click Device > Support > Generate Tech Support File from the NGFW web interface,
then download the file to a computer.
Download the Tech Support File from the support website, load it into the firewall, and
click Device > Support > Generate Tech Support File.

When should a Security Lifecycle Review be run?


primarily for helping Customer Support learn more about support cases
only for existing customers, to determine features and functions of the security
environment that are not fully or properly utilized
only for potentially new customers, to expose the security weaknesses of their existing
security environment
for existing customers as a health check and for potential customers to help build a
business case for Palo Alto Networks

How can an analyst identify which cloud-based data is accessible by outside users that have
credentials?
view the data section of an SLR report
define a Cortex XDR Alert for outside access to cloud-based data
generate a Data Access report from the Monitor page of the next-generation firewall
view a SaaS Risk Assessment report

To configure a firewall for SLR data collection, how is the data to be logged specified?
from the Partner Portal or Support Portal
with an ACL on the customer switch SPAN port
by a Security Policy rule on the firewall
from Monitor > Manage Custom Reports on the firewall web interface

Which comparison does a BPA Report present?


signatures in the firewall against signatures available from WildFire®
a customer's configuration against the results of a customer interview
a customer's NGFW configuration against best practices
customer breaches against those that would be blocked by a properly licensed and
configured firewall

How does Cortex XDR identify behavioral anomalies?


comparing customer behavior with a current list of abnormal behavior
comparing new traffic and host profile data to a baseline of normal customer¬-specific
activity built by analyzing collected data over 30 days and
comparing customer traffic behavior to a huge database of that customer’s competitors’
traffic behavior
comparing customer behavior to known behaviors found in environments with good
security hygiene
comparing differences among data from Traps, Prisma SaaS, the Next-Generation
firewall, and Prisma Access agents
How do security rules and security profiles work together to create security policy?
The firewall forwards traffic when it finds either a security rule or a security profile that
allows that traffic.
Security rules specify what happens to traffic that an attached security profile would
otherwise allow.
Security profiles specify what happens to traffic that an attached security rule would
otherwise allow.
Security profiles specify what happens to traffic that an attached security rule blocks.

How is the data in a Stats Dump file made available for SLR Report creation?
fed through the Cortex Data Lake and made available to the SLR app
automatically pulled by Panorama and uploaded to the Partner Portal
uploaded directly from the firewall to the Partner Portal
downloaded from the firewall to a computer, then uploaded when requested from the
Partner Portal

What is the purpose of the “Executive Summary“ section of the SLR?


summarize pricing to address issues identified by an SLR
show the Sensitive Lost Resource properties in one place
highlight key findings
summarize the BOM for a large proposal

Das könnte Ihnen auch gefallen