Q1. Which action protects against port scans from the internet?
A.Apply App-ID Security policy rules to block traffic sourcing from the untrust zone.
B. Assign Security profiles to Security policy rules for traffic sourcing from the untrust zone.
C. Apply a Zone Protection profile on the zone of the ingress interface.
D. Assign an Interface Management profile to the zone of the ingress surface.
Correct Answer: C
Q2. Which application gathers health telemetry about a device and its WiFi connectivity in order to help determine whether the device or the WiFi is the cause of any performance issues?
A.data loss prevention (DLP)
B. remote browser isolation (RBI)
C. Cortex Data Lake
D. GlobalProtect
Correct Answer: C
Q3. What are two ways service connections and remote network connections differ? (Choose two.)
A.Remote network connections provide secondary WAN options, but service connections use backup service connection for redundancy.
B. Remote network connections enforce security policies, but service connections do not.
C. An on-premises resource cannot originate a connection to the internet over a service connection.
D. Service connections support both OSPF and BGP for routing protocols, but remote networks support only BGP.
Correct Answer: A
Q4. Which element of a secure access service edge (SASE)-enabled network provides true integration of services, not service chains, with combined services and visibility for all locations, mobile users, and the cloud?
A.identity and network location
B. broad network-edge support
C. converged WAN edge and network security
D. cloud-native, cloud-based delivery
Correct Answer: D
Q5. In which step of the Five-Step Methodology for implementing the Zero Trust model does inspection and logging of all traffic take place?
A.Step 4: Create the Zero Trust policy
B. Step 3: Architect a Zero Trust network
C. Step 1: Define the protect surface
D. Step 5: Monitor and maintain the network
Correct Answer: D
$ 39
Reviews
There are no reviews yet.