When a customer creates a new SLR report, what is the first step in generating a proper SLR report once
logged in to the Partner Portal?
A.
Click the Track my deals button to view your open Opportunities.
B.
Scroll down and click the New Security Lifecycle Review button.
C.
Click the Select files… button and find the relevant statsdump file on your local machine and click
Upload.
D.
Select the appropriate Opportunity.
Click the Track my deals button to view your open Opportunities.
A prospective customer was the victim of a zero-day attack that compromised specific employees, who then
became unwitting attack vectors. The customer does not want that to happen again.
Which two Palo Alto Networks platform components will help this customer? (Choose two.)
A.
Traps
B.
Correlation Objects
C.
Wildfire
D.
Autofocus
Traps
Wildfire
What are three sources of malware sample data for the Palo Alto Networks Threat Intelligence Cloud?
(Choose three.)
A.
Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat Alliance
B.
Palo Alto Networks AutoFocus generated Correlation Objects
C.
Palo Alto Networks Next Generation Firewalls deployed with Wildfire Analysis Security Profiles
D.
WF-500 configured as private clouds for privacy concerns
E.
Palo Alto Networks non-firewall products, like Traps and Aperture
Third-Party data feeds, like the partnership with ProofPoint and the Cyber Threat Alliance
Palo Alto Networks AutoFocus generated Correlation Objects
Palo Alto Networks non-firewall products, like Traps and Aperture
A customer is targeted by a true zero-day, targeted attack. However, the customer is protected by the Palo Alto
Networks security platform.
The attack leverages a previously unknown vulnerability in IE but utilizes existing hacking techniques on the
endpoint. It is transported over standard HTTP traffic and conforms to the HTML standards. It then attempts to
download from a website, compromised specifically for this attack, a custom piece of malware to run on the
endpoints.
Which element of the platform will stop this attack?
A.
App-ID
B.
PAN-DB
C.
Traps
D.
WildFire
WildFire
Which three items contain information about Command and Control (C&C) hosts? (Choose three.)
A.
Threat logs
B.
Data filtering logs
C.
Botnet reports
D.
SaaS reports
E.
WildFire analysts reports
Data filtering logs
Botnet reports
WildFire analysts reports
Page 2 out of 12 Pages |
Previous |