Which two features are found in a Palo Alto Networks NGFW but are absent in a legacy firewall product? (Choose two.)
A packet that is already associated with a current session arrives at the firewall.
What is the flow of the packet after the firewall determines that it is matched with an existing session?
Which three settings must be configured to enable Credential Phishing Prevention? (Choose three.)
A company has deployed the following
• VM-300 firewalls in AWS
• endpoint protection with the Traps Management Service
• a Panorama M-200 for managing its VM-Series firewalls
• PA-5220s for its internet perimeter,
• Prisma SaaS for SaaS security.
Which two products can send logs to the Cortex Data Lake? (Choose two).
What are three key benefits of the Palo Alto Networks platform approach to security? (Choose three)
A customer with a legacy firewall architecture is focused on port and protocol level security, and has heard that next generation firewalls open all ports by default. What is the appropriate rebuttal that positions the value of a NGFW over a legacy firewall?
Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?
Which two configuration items are required when the NGFW needs to act as a decryption broker for multiple transparent bridge security chains? (Choose two.)