Vous êtes sur la page 1sur 5

Realize Your Potential: paloaltonetworks

1 of 5

https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...

Test - Accredited Sales Expert (ASE 2014-9) - English - Test

ASE Test

Question 1 of 20.
What are the ways you can deploy the VM-Series? Select all answers that apply.
As a guest VM on VMware ESXi servers
Integrated with VMware NSX in VMware virtualized environments
Integrated on a Citrix NetScaler SDX platform
None of the above

Mark for follow up

Question 2 of 20.
You need to manage mobile devices primarily to make sure the device is properly configured before accessing
applications and data.
True

False

Mark for follow up

Question 3 of 20.
Palo Alto Networks builds the only enterprise security platform which
Provides visibility and control over a small quantity of applications
Protects a limited number of users on specific devices
Prevents known and unknown cyber threats
Provides security solely at the network perimeter

Mark for follow up

Question 4 of 20.
All NGFW vendors offer the ability to see all traffic regardless of the port, protocol or whether the traffic is encrypted.
True

False

Mark for follow up

Question 5 of 20.
Palo Alto Networks solution for the data center includes both physical and virtual appliances to protect North-South and
East-West traffic.

3/30/2016 10:32 PM

Realize Your Potential: paloaltonetworks

2 of 5

True

https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...

False

Mark for follow up

Question 6 of 20.
If you want to keep your customer out of the headlines, which do you recommend?
a Next-Generation Firewall (NGFW)
a Unified Threat Management (UTM) appliance
waiting for the "next" Next-Generation Firewall to come along
None of the above

Mark for follow up

Question 7 of 20.
Enterprise security = Network security + Cybersecurity + __________" + Endpoint security + Security analytics
Gateway security
Mobile security
Physical security
System security

Mark for follow up

Question 8 of 20.
Which three teams do you need to influence to sell in the data center?
Virtualization/server teams, Networking Teams, Security Teams
Virtualization/server teams, Security Teams, Executive Teams
Mobility Teams, Networking Teams, Executive Teams
Networking Teams, Security Teams, Mobility Teams
Virtualization/server teams, Mobility Teams, Networking Teams

Mark for follow up

Question 9 of 20.
Which of the following security challenges were identified across the Healthcare industry? Select the 3 correct
answers.
Regulatory compliance and audits
Threats faced by modbus-based control networks
Data protection that matches risk levels (different users, each with different access rights)
Non-patchable systems and devices

3/30/2016 10:32 PM

Realize Your Potential: paloaltonetworks

3 of 5

https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...

Mark for follow up

Question 10 of 20.
WildFire can detect zero-day exploits, in addition to unknown malware.
True

False

Mark for follow up

Question 11 of 20.
What is the Palo Alto Networks enterprise security platform?
A device (or collection of devices)
A firewall with bolted-on capabilities
Marketecture or a marketing term
An architecture comprised of hardware and software
None of the above

Mark for follow up

Question 12 of 20.
Which operating systems does WildFire support? Select the 3 correct answers.
Mac OSX
Windows XP
Android OS
Windows 8
Windows 7

Mark for follow up

Question 13 of 20.
In what ways does Palo Alto Networks control access to data? Select the 3 correct answers.
Controls access based on the user
Controls access based on the device
Controls access based on the device state
We do not control access to data
None of the above

Mark for follow up

3/30/2016 10:32 PM

Realize Your Potential: paloaltonetworks

4 of 5

https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...

Question 14 of 20.
The GlobalProtect App supports both Android and iOS mobile platforms.
True

False

Mark for follow up

Question 15 of 20.
To try and address the challenges of traditional security, legacy network security vendors effectively had two choices:
(Select the correct answer discussed in the course)
Investigate options or consolidate offices
Sell additional subscriptions or be acquired by larger security vendor
Offer firewall helpers or consolidate functions
Build UTM product or update company logo

Mark for follow up

Question 16 of 20.
Palo Alto Networks is the only company that today is able to deal with unknown threats and unknown malware in an
automated fashion, and use the cloud to make that available to all of our customers.
True

False

Mark for follow up

Question 17 of 20.
To create better security effectiveness, it requires enterprises to perform a lot of manual intervention to correlate all of
the information coming from their different security devices.
True

False

Mark for follow up

Question 18 of 20.
There is a distinct difference between the types of conversations youll face when positioning network security at a
hospital versus speaking with the owners of a nuclear facility.
True

False

Mark for follow up

Question 19 of 20.
In addition to their threat intelligence cloud, which dedicated appliance does Palo Alto Networks build that helps detect
unknown threats, and delivers that intelligence back into the infrastructure in as little as 30 minutes? (Choose 1)

3/30/2016 10:32 PM

Realize Your Potential: paloaltonetworks

5 of 5

https://paloaltonetworks.csod.com/Evaluations/EvalLaunch.aspx?loid=c1...

WF-500
M-100
PA-3020
GP-100

Mark for follow up

Question 20 of 20.
What five industries are Palo Alto Networks currently focusing on at this time?
Healthcare, Manufacturing, Entertainment, Aerospace, Pharmaceutical
Healthcare, Government, Education, Manufacturing, Entertainment
Financial Services, Government, Healthcare, Education, SCADA
Healthcare, Education, SCADA, Automotive, Manufacturing

Mark for follow up

Save / Return Later

Summary

3/30/2016 10:32 PM

Vous aimerez peut-être aussi