Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)

Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)A . facebookB . facebook-chatC . facebook-baseD . facebook-emailView AnswerAnswer: BC Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClV0CAK

December 15, 2020 No Comments READ MORE +

Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?

Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?A . Threat PreventionB . WildFireC . AntivirusD . URL FilteringView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/install-content-and­software-updates.html

December 15, 2020 No Comments READ MORE +

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...

December 15, 2020 No Comments READ MORE +

Actions can be set for which two items in a URL filtering security profile? (Choose two.)

Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: AD

December 15, 2020 No Comments READ MORE +

At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email?

At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email? A . DeliveryB . ReconnaissanceC . Command and ControlD . ExploitationView AnswerAnswer: D

December 13, 2020 No Comments READ MORE +

A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based on the information, how is the SuperApp traffic affected after the 30 days have passed?

A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based...

December 13, 2020 No Comments READ MORE +

Which two security profile components will detect and prevent this threat after the firewall’s signature database has been updated?

An administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact a command-and-control (C2) server. Which two security profile components will detect and prevent this threat after the firewall’s signature database has been updated? (Choose two.)A ....

December 12, 2020 No Comments READ MORE +

Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.

Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.A . on either the data place or the management plane.B . after it is matched by a security policy rule that allows traffic.C . before it is matched to a Security policy rule.D...

December 12, 2020 No Comments READ MORE +

Match the Cyber-Attack Lifecycle stage to its correct description

DRAG DROP Match the Cyber-Attack Lifecycle stage to its correct description. View AnswerAnswer:

December 11, 2020 No Comments READ MORE +

Which security policy is blocking the YouTube application?

Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application?A . intrazone-defaultB . Deny GoogleC . allowed-security servicesD . interzone-defaultView AnswerAnswer: D

December 11, 2020 No Comments READ MORE +