What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...
Which interface type can use virtual routers and routing protocols?
Which interface type can use virtual routers and routing protocols?A . TapB . Layer3C . Virtual WireD . Layer2View AnswerAnswer: B
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A
Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?
Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?A . It functions like PAN-DB and requires activation through the app portal.B . It removes the 100K limit for DNS entries for the downloaded DNS updates.C . IT eliminates the need for dynamic DNS updates.D...
Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?
Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?A . local usernameB . dynamic user groupC . remote usernameD . static user groupView AnswerAnswer: D
create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent
create a service account on the Domain Controller with sufficient permissions to execute the User- ID agentA . 2-3-4-1B . 1-4-3-2C . 3-1-2-4D . 1-3-2-4View AnswerAnswer: D
To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?
To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?A . domain controllerB . TACACS+C . LDAPD . RADIUSView AnswerAnswer: C
Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?
Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?A . globalB . intrazoneC . interzoneD . universalView AnswerAnswer: D Explanation: References: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClomCAC
Which security profile feature could have been used to prevent the communication with the CnC server?
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data...
Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.
Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone. Complete the security policy to ensure only Telnet is allowed. Security Policy: Source Zone: Internal to DMZ Zone __________services “Application defaults”, and action = AllowA . Destination IP: 192.168.1.123/24B . Application =...