What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...

March 17, 2021 No Comments READ MORE +

Which interface type can use virtual routers and routing protocols?

Which interface type can use virtual routers and routing protocols?A . TapB . Layer3C . Virtual WireD . Layer2View AnswerAnswer: B

March 16, 2021 No Comments READ MORE +

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A

March 16, 2021 No Comments READ MORE +

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?A . It functions like PAN-DB and requires activation through the app portal.B . It removes the 100K limit for DNS entries for the downloaded DNS updates.C . IT eliminates the need for dynamic DNS updates.D...

March 16, 2021 No Comments READ MORE +

Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?

Starting with PAN_OS version 9.1 which new type of object is supported for use within the user field of a security policy rule?A . local usernameB . dynamic user groupC . remote usernameD . static user groupView AnswerAnswer: D

March 14, 2021 No Comments READ MORE +

create a service account on the Domain Controller with sufficient permissions to execute the User- ID agent

create a service account on the Domain Controller with sufficient permissions to execute the User- ID agentA . 2-3-4-1B . 1-4-3-2C . 3-1-2-4D . 1-3-2-4View AnswerAnswer: D

March 14, 2021 No Comments READ MORE +

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?A . domain controllerB . TACACS+C . LDAPD . RADIUSView AnswerAnswer: C

March 14, 2021 No Comments READ MORE +

Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?

Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?A . globalB . intrazoneC . interzoneD . universalView AnswerAnswer: D Explanation: References: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClomCAC

March 14, 2021 No Comments READ MORE +

Which security profile feature could have been used to prevent the communication with the CnC server?

The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data...

March 14, 2021 No Comments READ MORE +

Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.

Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone. Complete the security policy to ensure only Telnet is allowed. Security Policy: Source Zone: Internal to DMZ Zone __________services “Application defaults”, and action = AllowA . Destination IP: 192.168.1.123/24B . Application =...

March 13, 2021 No Comments READ MORE +