Which operations are allowed when working with App-ID application tags?
Which operations are allowed when working with App-ID application tags?A . Predefined tags may be deleted.B . Predefined tags may be augmented by custom tags.C . Predefined tags may be modified.D . Predefined tags may be updated by WildFire dynamic updates.View AnswerAnswer: B
Based on the security policy rules shown, ssh will be allowed on which port?
Based on the security policy rules shown, ssh will be allowed on which port? A . 80B . 53C . 22D . 23View AnswerAnswer: C
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?A . GlobalProtectB . AutoFocusC . ApertureD . PanoramaView AnswerAnswer: A
What is the correct process to enable this logging1?
An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs. What is the correct process to enable this logging1?A . Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start and click OKB . Select the...
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...
Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?
Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?A . URL filteringB . AntivirusC . WildFireD . Threat PreventionView AnswerAnswer: D
Which protocol used to map username to user groups when user-ID is configured?
Which protocol used to map username to user groups when user-ID is configured?A . SAMLB . RADIUSC . TACACS+D . LDAPView AnswerAnswer: D
Which statement is true regarding a Prevention Posture Assessment?
Which statement is true regarding a Prevention Posture Assessment?A . The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categoriesB . It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network...
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
Which the app-ID application will you need to allow in your security policy to use facebook-chat?A . facebook-emailB . facebook-baseC . facebookD . facebook-chatView AnswerAnswer: B,D
Arrange the correct order that the URL classifications are processed within the system
DRAG DROP Arrange the correct order that the URL classifications are processed within the system. View AnswerAnswer: Explanation: First C Block List Second C Allow List Third C Custom URL Categories Fourth C External Dynamic Lists Fifth C Downloaded PAN-DB Files Sixth - PAN-DB Cloud