Which two statements correctly describe best practices for sizing a firewall deployment with decryption enabled? (Choose two.)
A company plans to deploy identity for improved visibility and identity-based controls for least privilege access to applications and data. The company does not have an on-premises Active Directory (AD) deployment, and devices are connected and managed by using a combination of Entra ID and Jamf.
Which two supported sources for identity are appropriate for this environment? (Choose two.)
A systems engineer (SE) has joined a team to work with a managed security services provider (MSSP) that is evaluating PAN-OS for edge connections to their customer base. The MSSP is concerned about how to efficiently handle routing with all of its customers, especially how to handle BGP peering, because it has created a standard set of rules and settings that it wants to apply to each customer, as well as to maintain and update them. The solution requires logically separated BGP peering setups for each customer. What should the SE do to increase the probability of Palo Alto Networks being awarded the deal?
Which initial action can a network security engineer take to prevent a malicious actor from using a file-sharing application for data exfiltration without impacting users who still need to use file-sharing applications?
A large global company plans to acquire 500 NGFWs to replace its legacy firewalls and has a specific requirement for centralized logging and reporting capabilities.
What should a systems engineer recommend?
Which two actions can a systems engineer take to discover how Palo Alto Networks can bring value to a customer's business when they show interest in adopting Zero Trust? (Choose two.)
A company has multiple business units, each of which manages its own user directories and identity providers (IdPs) with different domain names. The company’s network security team wants to deploy a shared GlobalProtect remote access service for all business units to authenticate users to each business unit's IdP.
Which configuration will enable the network security team to authenticate GlobalProtect users to multiple SAML IdPs?
When a customer needs to understand how Palo Alto Networks NGFWs lower the risk of exploitation by newly announced vulnerabilities known to be actively attacked, which solution and functionality delivers the most value?
Which technique is an example of a DNS attack that Advanced DNS Security can detect and prevent?
Which two compliance frameworks are included with the Premium version of Strata Cloud Manager (SCM)? (Choose two)
Which use case is valid for Palo Alto Networks Next-Generation Firewalls (NGFWs)?
Which two tools should a systems engineer use to showcase the benefit of an evaluation that a customer has just concluded?
A prospective customer is concerned about stopping data exfiltration, data infiltration, and command-and-control (C2) activities over port 53.
Which subscription(s) should the systems engineer recommend?