How should the administrator configure the firewall to allow multiple applications in a dynamic environment?
An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?A . Create an Application Filter and name it Office Programs, then filter it on the business-systems category, office-programs subcategoryB . Create an Application...
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?A . Threat PreventionB . WildFireC . AntivirusD . URL FilteringView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/install-content-andÂsoftware-updates.html
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email?
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email? A . DeliveryB . ReconnaissanceC . Command and ControlD . ExploitationView AnswerAnswer: D
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: BC
Which security policy is blocking the YouTube application?
Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application?A . intrazone-defaultB . Deny GoogleC . allowed-security servicesD . interzone-defaultView AnswerAnswer: D
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?A . Windows session monitoring via a domain controllerB . passive server monitoring using the Windows-based agentC . Captive PortalD . passive server monitoring using a PAN-OS integrated User-ID agentView AnswerAnswer:...
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email?
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email? A . DeliveryB . ReconnaissanceC . Command and ControlD . ExploitationView AnswerAnswer: D
Which plane on a Palo Alto Networks Firewall provides configuration, logging, and reporting functions on a separate processor?
Which plane on a Palo Alto Networks Firewall provides configuration, logging, and reporting functions on a separate processor?A . managementB . network processingC . dataD . security processingView AnswerAnswer: A
Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)
Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)A . facebookB . facebook-chatC . facebook-baseD . facebook-emailView AnswerAnswer: BC Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClV0CAK