Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?
Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?A . globalB . intrazoneC . interzoneD . universalView AnswerAnswer: D Explanation: References: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClomCAC
How should you configure the firewall to allow access to any office-suite application?
You need to allow users to access the officeCsuite application of their choice . How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre OfficeB . Create an Application Group and add business-systems...
Which rule type is appropriate for matching traffic both within and between the source and destination zones?
Which rule type is appropriate for matching traffic both within and between the source and destination zones?A . interzoneB . shadowedC . intrazoneD . universalView AnswerAnswer: A
How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?
How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?A . Disable automatic updates during weekdaysB . Automatically “download and install” but with the “disable new applications” option usedC . Automatically “download only” and then install Applications...
Which firewall plane provides configuration, logging, and reporting functions on a separate processor?
Which firewall plane provides configuration, logging, and reporting functions on a separate processor?A . controlB . network processingC . dataD . security processingView AnswerAnswer: A
Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)
Given the screenshot, what are two correct statements about the logged traffic? (Choose two.) A . The web session was unsuccessfully decrypted.B . The traffic was denied by security profile.C . The traffic was denied by URL filtering.D . The web session was decrypted.View AnswerAnswer: C,D
At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email?
At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email? A . deliveryB . command and controlC . explotationD . reinsuranceE . installationView AnswerAnswer: A
Which user-ID agent sufficient in your network?
Your company occupies one floor in a single building you have two active directory domain controllers on a single networks the firewall s management plane is only slightly utilized. Which user-ID agent sufficient in your network?A . PAN-OS integrated agent deployed on the firewallB . Windows-based agent deployed on the...
Which log setting configuration is consistent with best practices tor normal traffic?
An administrator is reviewing another administrator s Security policy log settings Which log setting configuration is consistent with best practices tor normal traffic?A . Log at Session Start and Log at Session End both enabledB . Log at Session Start disabled Log at Session End enabledC . Log at Session...
Which two security profile types can be attached to a security policy? (Choose two.)
Which two security profile types can be attached to a security policy? (Choose two.)A . antivirusB . DDoS protectionC . threatD . vulnerabilityView AnswerAnswer: A,D