Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?A . Windows session monitoring via a domain controllerB . passive server monitoring using the Windows-based agentC . Captive PortalD . passive server monitoring using a PAN-OS integrated User-ID agentView AnswerAnswer:...
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...
Which interface does not require a MAC or IP address?
Which interface does not require a MAC or IP address?A . Virtual WireB . Layer3C . Layer2D . LoopbackView AnswerAnswer: A
Which security policy is blocking the YouTube application?
Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application? A . intrazone-defaultB . Deny GoogleC . allowed-security servicesD . interzone-defaultView AnswerAnswer: D
Which utility should the company use to identify out-of-date or unused rules on the firewall?
A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?A . Rule Usage Filter > No App SpecifiedB . Rule Usage Filter >Hit Count > Unused in 30...
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None? A . Translation TypeB . InterfaceC . Address TypeD . IP AddressView AnswerAnswer: A
Which statement is true regarding a Best Practice Assessment?
Which statement is true regarding a Best Practice Assessment?A . The BPA tool can be run only on firewallsB . It provides a percentage of adoption for each assessment dataC . The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus...
A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based on the information, how is the SuperApp traffic affected after the 30 days have passed?
A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based...
How should the administrator configure the firewall to allow multiple applications in a dynamic environment?
An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?A . Create an Application Filter and name it Office Programs, the filter it on the business-systems category, office-programs subcategoryB . Create an Application...
Match the Palo Alto Networks Security Operating Platform architecture to its description
DRAG DROP Match the Palo Alto Networks Security Operating Platform architecture to its description. View AnswerAnswer: