Which action results in the firewall blocking network traffic with out notifying the sender?

Which action results in the firewall blocking network traffic with out notifying the sender?A . DropB . DenyC . Reset ServerD . Reset ClientView AnswerAnswer: A

March 23, 2021 No Comments READ MORE +

Arrange the correct order that the URL classifications are processed within the system

DRAG DROP Arrange the correct order that the URL classifications are processed within the system. View AnswerAnswer: Explanation: First C Block List Second C Allow List Third C Custom URL Categories Fourth C External Dynamic Lists Fifth C Downloaded PAN-DB Files Sixth - PAN-DB Cloud

March 23, 2021 No Comments READ MORE +

What is an advantage for using application tags?

What is an advantage for using application tags?A . They are helpful during the creation of new zonesB . They help with the design of IP address allocations in DHCD . They help content updates automate policy updatesE . They help with the creation of interfacesView AnswerAnswer: C

March 23, 2021 No Comments READ MORE +

If you configured each choices to block the sameURL then which choice would be the last to block access to the URL?

TION NO: 109 Four configuration choices are listed, and each could be used to block access to a specific URL. If you configured each choices to block the sameURL then which choice would be the last to block access to the URL?A . EDL in URL Filtering Profile.B . Custom...

March 23, 2021 No Comments READ MORE +

Based on the security policy rules shown, ssh will be allowed on which port?

Based on the security policy rules shown, ssh will be allowed on which port? A . 80B . 53C . 22D . 23View AnswerAnswer: C

March 22, 2021 No Comments READ MORE +

Which policy is required to enable source NAT on the firewall?

An internal host wants to connect to servers of the internet through using source NAT. Which policy is required to enable source NAT on the firewall?A . NAT policy with source zone and destination zone specifiedB . post-NAT policy with external source and any destination addressC . NAT policy with...

March 22, 2021 No Comments READ MORE +

Which Security profile feature could have been used to prevent the communications with the command-and-control server?

The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop the malware contacted a known command-and-control server which exfiltrating corporate data. Which Security profile feature could have been used to prevent the communications with the command-and-control server?A . Create a Data...

March 22, 2021 No Comments READ MORE +

How is the hit count reset on a rule?

How is the hit count reset on a rule?A . select a security policy rule, right click Hit Count > ResetB . with a dataplane rebootC . Device > Setup > Logging and Reporting Settings > Reset Hit CountD . in the CLI, type command reset hitcount <POLICY-NAME>View AnswerAnswer: A

March 22, 2021 No Comments READ MORE +

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?A . Active Directory monitoringB . Windows session monitoringC . Windows client probingD . domain controller monitoringView AnswerAnswer: A

March 21, 2021 No Comments READ MORE +

Match the Palo Alto Networks Security Operating Platform architecture to its description

DRAG DROP Match the Palo Alto Networks Security Operating Platform architecture to its description. View AnswerAnswer: Explanation: Threat Intelligence Cloud C Gathers, analyzes, correlates, and disseminates threats to and from the network and endpoints located within the network. Next-Generation Firewall C Identifies and inspects all traffic to block known threats...

March 21, 2021 No Comments READ MORE +