Which policy is required to enable source NAT on the firewall?

An internal host wants to connect to servers of the internet through using source NAT. Which policy is required to enable source NAT on the firewall?A . NAT policy with source zone and destination zone specifiedB . post-NAT policy with external source and any destination addressC . NAT policy with...

September 18, 2021 No Comments READ MORE +

How should you configure the firewall to allow access to any office-suite application?

You need to allow users to access the officeCsuite application of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre OfficeB . Create an Application Group and add business-systems to...

September 18, 2021 No Comments READ MORE +

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)A . User identificationB . Filtration protectionC . Vulnerability protectionD . AntivirusE . Application identificationF . Anti-spywareView AnswerAnswer: A,C,D,E,F

September 17, 2021 No Comments READ MORE +

Actions can be set for which two items in a URL filtering security profile? (Choose two.)

Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions

September 17, 2021 No Comments READ MORE +

What are three differences between security policies and security profiles? (Choose three.)

What are three differences between security policies and security profiles? (Choose three.)A . Security policies are attached to security profilesB . Security profiles are attached to security policiesC . Security profiles should only be used on allowed trafficD . Security profiles are used to block traffic by themselvesE . Security...

September 17, 2021 No Comments READ MORE +

Based on the graphic which statement accurately describes the output shown in the server monitoring panel?

Based on the graphic which statement accurately describes the output shown in the server monitoring panel? A . The User-ID agent is connected to a domain controller labeled lab-client.B . The host lab-client has been found by the User-ID agent.C . The host lab-client has been found by a domain...

September 16, 2021 No Comments READ MORE +

Which security profile feature could have been used to prevent the communication with the CnC server?

The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data...

September 16, 2021 No Comments READ MORE +

Which update option is not available to administrators?

Which update option is not available to administrators?A . New Spyware NotificationsB . New URLsC . New Application SignaturesD . New Malicious DomainsE . New Antivirus SignaturesView AnswerAnswer: B

September 16, 2021 No Comments READ MORE +

Which option lists the attributes that are selectable when setting up an Application filters?

Which option lists the attributes that are selectable when setting up an Application filters?A . Category, Subcategory, Technology, and CharacteristicB . Category, Subcategory, Technology, Risk, and CharacteristicC . Name, Category, Technology, Risk, and CharacteristicD . Category, Subcategory, Risk, Standard Ports, and TechnologyView AnswerAnswer: B

September 15, 2021 No Comments READ MORE +

Which action results in the firewall blocking network traffic with out notifying the sender?

Which action results in the firewall blocking network traffic with out notifying the sender?A . DropB . DenyC . Reset ServerD . Reset ClientView AnswerAnswer: B

September 15, 2021 No Comments READ MORE +