Access to which feature requires the PAN-OS Filtering license?
Access to which feature requires the PAN-OS Filtering license?A . PAN-DB databaseB . DNS SecurityC . Custom URL categoriesD . URL external dynamic listsView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-licenses-andsubscriptions.html
Which dynamic update type includes updated anti-spyware signatures?
Which dynamic update type includes updated anti-spyware signatures?A . Applications and ThreatsB . GlobalProtect Data FileC . AntivirusD . PAN-DBView AnswerAnswer: A
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)A . Layer-IDB . User-IDC . QoS-IDD . App-IDView AnswerAnswer: B,D
Given the topology, which zone type should zone A and zone B to be configured with?
Given the topology, which zone type should zone A and zone B to be configured with? A . Layer3B . TapC . Layer2D . Virtual WireView AnswerAnswer: A
Match the Palo Alto Networks Security Operating Platform architecture to its description
DRAG DROP Match the Palo Alto Networks Security Operating Platform architecture to its description. View AnswerAnswer: Explanation: Threat Intelligence Cloud C Gathers, analyzes, correlates, and disseminates threats to and from the network and endpoints located within the network. Next-Generation Firewall C Identifies and inspects all traffic to block known threats...
Which interface does not require a MAC or IP address?
Which interface does not require a MAC or IP address?A . Virtual WireB . Layer3C . Layer2D . LoopbackView AnswerAnswer: A
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A
To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?
To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?A . domain controllerB . TACACS+C . LDAPD . RADIUSView AnswerAnswer: C
Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.)
Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.) A . Path monitoring does not determine if route is useableB . Route with highest metric is actively usedC . Path monitoring determines if route is useableD . Route with lowest metric is actively usedView...
Based on the security policy rules shown, ssh will be allowed on which port?
Based on the security policy rules shown, ssh will be allowed on which port? A . any portB . same port as ssl and snmpv3C . the default portD . only ephemeral portsView AnswerAnswer: C