Which policy is required to enable source NAT on the firewall?
An internal host wants to connect to servers of the internet through using source NAT. Which policy is required to enable source NAT on the firewall?A . NAT policy with source zone and destination zone specifiedB . post-NAT policy with external source and any destination addressC . NAT policy with...
How should you configure the firewall to allow access to any office-suite application?
You need to allow users to access the officeCsuite application of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre OfficeB . Create an Application Group and add business-systems to...
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)A . User identificationB . Filtration protectionC . Vulnerability protectionD . AntivirusE . Application identificationF . Anti-spywareView AnswerAnswer: A,C,D,E,F
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions
What are three differences between security policies and security profiles? (Choose three.)
What are three differences between security policies and security profiles? (Choose three.)A . Security policies are attached to security profilesB . Security profiles are attached to security policiesC . Security profiles should only be used on allowed trafficD . Security profiles are used to block traffic by themselvesE . Security...
Based on the graphic which statement accurately describes the output shown in the server monitoring panel?
Based on the graphic which statement accurately describes the output shown in the server monitoring panel? A . The User-ID agent is connected to a domain controller labeled lab-client.B . The host lab-client has been found by the User-ID agent.C . The host lab-client has been found by a domain...
Which security profile feature could have been used to prevent the communication with the CnC server?
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data...
Which update option is not available to administrators?
Which update option is not available to administrators?A . New Spyware NotificationsB . New URLsC . New Application SignaturesD . New Malicious DomainsE . New Antivirus SignaturesView AnswerAnswer: B
Which option lists the attributes that are selectable when setting up an Application filters?
Which option lists the attributes that are selectable when setting up an Application filters?A . Category, Subcategory, Technology, and CharacteristicB . Category, Subcategory, Technology, Risk, and CharacteristicC . Name, Category, Technology, Risk, and CharacteristicD . Category, Subcategory, Risk, Standard Ports, and TechnologyView AnswerAnswer: B
Which action results in the firewall blocking network traffic with out notifying the sender?
Which action results in the firewall blocking network traffic with out notifying the sender?A . DropB . DenyC . Reset ServerD . Reset ClientView AnswerAnswer: B