Realize Your Potential - Paloaltonetworks
Realize Your Potential - Paloaltonetworks
Realize Your Potential - Paloaltonetworks
1 of 5
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...
ASE Test
Question 1 of 20.
What are the ways you can deploy the VM-Series? Select all answers that apply.
As a guest VM on VMware ESXi servers
Integrated with VMware NSX in VMware virtualized environments
Integrated on a Citrix NetScaler SDX platform
None of the above
Question 2 of 20.
You need to manage mobile devices primarily to make sure the device is properly configured before accessing
applications and data.
True
False
Question 3 of 20.
Palo Alto Networks builds the only enterprise security platform which
Provides visibility and control over a small quantity of applications
Protects a limited number of users on specific devices
Prevents known and unknown cyber threats
Provides security solely at the network perimeter
Question 4 of 20.
All NGFW vendors offer the ability to see all traffic regardless of the port, protocol or whether the traffic is encrypted.
True
False
Question 5 of 20.
Palo Alto Networks solution for the data center includes both physical and virtual appliances to protect North-South and
East-West traffic.
3/30/2016 10:32 PM
2 of 5
True
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...
False
Question 6 of 20.
If you want to keep your customer out of the headlines, which do you recommend?
a Next-Generation Firewall (NGFW)
a Unified Threat Management (UTM) appliance
waiting for the "next" Next-Generation Firewall to come along
None of the above
Question 7 of 20.
Enterprise security = Network security + Cybersecurity + __________" + Endpoint security + Security analytics
Gateway security
Mobile security
Physical security
System security
Question 8 of 20.
Which three teams do you need to influence to sell in the data center?
Virtualization/server teams, Networking Teams, Security Teams
Virtualization/server teams, Security Teams, Executive Teams
Mobility Teams, Networking Teams, Executive Teams
Networking Teams, Security Teams, Mobility Teams
Virtualization/server teams, Mobility Teams, Networking Teams
Question 9 of 20.
Which of the following security challenges were identified across the Healthcare industry? Select the 3 correct
answers.
Regulatory compliance and audits
Threats faced by modbus-based control networks
Data protection that matches risk levels (different users, each with different access rights)
Non-patchable systems and devices
3/30/2016 10:32 PM
3 of 5
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...
Question 10 of 20.
WildFire can detect zero-day exploits, in addition to unknown malware.
True
False
Question 11 of 20.
What is the Palo Alto Networks enterprise security platform?
A device (or collection of devices)
A firewall with bolted-on capabilities
Marketecture or a marketing term
An architecture comprised of hardware and software
None of the above
Question 12 of 20.
Which operating systems does WildFire support? Select the 3 correct answers.
Mac OSX
Windows XP
Android OS
Windows 8
Windows 7
Question 13 of 20.
In what ways does Palo Alto Networks control access to data? Select the 3 correct answers.
Controls access based on the user
Controls access based on the device
Controls access based on the device state
We do not control access to data
None of the above
3/30/2016 10:32 PM
4 of 5
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...
Question 14 of 20.
The GlobalProtect App supports both Android and iOS mobile platforms.
True
False
Question 15 of 20.
To try and address the challenges of traditional security, legacy network security vendors effectively had two choices:
(Select the correct answer discussed in the course)
Investigate options or consolidate offices
Sell additional subscriptions or be acquired by larger security vendor
Offer firewall helpers or consolidate functions
Build UTM product or update company logo
Question 16 of 20.
Palo Alto Networks is the only company that today is able to deal with unknown threats and unknown malware in an
automated fashion, and use the cloud to make that available to all of our customers.
True
False
Question 17 of 20.
To create better security effectiveness, it requires enterprises to perform a lot of manual intervention to correlate all of
the information coming from their different security devices.
True
False
Question 18 of 20.
There is a distinct difference between the types of conversations youll face when positioning network security at a
hospital versus speaking with the owners of a nuclear facility.
True
False
Question 19 of 20.
In addition to their threat intelligence cloud, which dedicated appliance does Palo Alto Networks build that helps detect
unknown threats, and delivers that intelligence back into the infrastructure in as little as 30 minutes? (Choose 1)
3/30/2016 10:32 PM
5 of 5
https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...
WF-500
M-100
PA-3020
GP-100
Question 20 of 20.
What five industries are Palo Alto Networks currently focusing on at this time?
Healthcare, Manufacturing, Entertainment, Aerospace, Pharmaceutical
Healthcare, Government, Education, Manufacturing, Entertainment
Financial Services, Government, Healthcare, Education, SCADA
Healthcare, Education, SCADA, Automotive, Manufacturing
Summary
3/30/2016 10:32 PM