Which file is used to save the running configuration with a Palo Alto Networks firewall?

Which file is used to save the running configuration with a Palo Alto Networks firewall?A . running-config.xmlB . run-config.xmlC . running-configuration.xmlD . run-configuratin.xmlView AnswerAnswer: A

September 28, 2021 No Comments READ MORE +

Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)

Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)A . facebookB . facebook-chatC . facebook-baseD . facebook-emailView AnswerAnswer: B,C

September 27, 2021 No Comments READ MORE +

Match the cyber-attack lifecycle stage to its correct description

DRAG DROP Match the cyber-attack lifecycle stage to its correct description. View AnswerAnswer:

September 27, 2021 No Comments READ MORE +

Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?

Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?A . overrideB . authorizationC . authenticationD . continueView AnswerAnswer: A

September 27, 2021 No Comments READ MORE +

Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?

Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?A . Prisma SaaSB . PanoramaC . AutoFocusD . GlobalProtectView AnswerAnswer: B

September 26, 2021 No Comments READ MORE +

Given the image, which two options are true about the Security policy rules. (Choose two.)

Given the image, which two options are true about the Security policy rules. (Choose two.) A . The Allow Office Programs rule is using an Application FilterB . In the Allow FTP to web server rule, FTP is allowed using App-IDC . The Allow Office Programs rule is using an...

September 26, 2021 No Comments READ MORE +

Which utility should the company use to identify out-of-date or unused rules on the firewall?

A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?A . Rule Usage Filter > No App SpecifiedB . Rule Usage Filter >Hit Count > Unused in 30...

September 26, 2021 No Comments READ MORE +

How often does WildFire release dynamic updates?

How often does WildFire release dynamic updates?A . every 5 minutesB . every 15 minutesC . every 60 minutesD . every 30 minutesView AnswerAnswer: A

September 26, 2021 No Comments READ MORE +

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?A . Active Directory monitoringB . Windows session monitoringC . Windows client probingD . domain controller monitoringView AnswerAnswer: A

September 25, 2021 No Comments READ MORE +

What is the main function of the Test Policy Match function?

What is the main function of the Test Policy Match function?A . verify that policy rules from Expedition are validB . confirm that rules meet or exceed the Best Practice Assessment recommendationsC . confirm that policy rules in the configuration are allowing/denying the correct trafficD . ensure that policy rules...

September 25, 2021 No Comments READ MORE +