Which operations are allowed when working with App-ID application tags?

Which operations are allowed when working with App-ID application tags?A . Predefined tags may be deleted.B . Predefined tags may be augmented by custom tags.C . Predefined tags may be modified.D . Predefined tags may be updated by WildFire dynamic updates.View AnswerAnswer: B

February 25, 2022 No Comments READ MORE +

Based on the security policy rules shown, ssh will be allowed on which port?

Based on the security policy rules shown, ssh will be allowed on which port? A . 80B . 53C . 22D . 23View AnswerAnswer: C

February 25, 2022 No Comments READ MORE +

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?A . GlobalProtectB . AutoFocusC . ApertureD . PanoramaView AnswerAnswer: A

February 25, 2022 No Comments READ MORE +

What is the correct process to enable this logging1?

An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs. What is the correct process to enable this logging1?A . Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start and click OKB . Select the...

February 24, 2022 No Comments READ MORE +

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...

February 24, 2022 No Comments READ MORE +

Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?

Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?A . URL filteringB . AntivirusC . WildFireD . Threat PreventionView AnswerAnswer: D

February 24, 2022 No Comments READ MORE +

Which protocol used to map username to user groups when user-ID is configured?

Which protocol used to map username to user groups when user-ID is configured?A . SAMLB . RADIUSC . TACACS+D . LDAPView AnswerAnswer: D

February 23, 2022 No Comments READ MORE +

Which statement is true regarding a Prevention Posture Assessment?

Which statement is true regarding a Prevention Posture Assessment?A . The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categoriesB . It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network...

February 23, 2022 No Comments READ MORE +

Which the app-ID application will you need to allow in your security policy to use facebook-chat?

Which the app-ID application will you need to allow in your security policy to use facebook-chat?A . facebook-emailB . facebook-baseC . facebookD . facebook-chatView AnswerAnswer: B,D

February 23, 2022 No Comments READ MORE +

Arrange the correct order that the URL classifications are processed within the system

DRAG DROP Arrange the correct order that the URL classifications are processed within the system. View AnswerAnswer: Explanation: First C Block List Second C Allow List Third C Custom URL Categories Fourth C External Dynamic Lists Fifth C Downloaded PAN-DB Files Sixth - PAN-DB Cloud

February 23, 2022 No Comments READ MORE +