Which log setting is correct?
An administrator wishes to follow best practices for logging traffic that traverses the firewall Which log setting is correct?A . Disable all loggingB . Enable Log at Session EndC . Enable Log at Session StartD . Enable Log at both Session Start and EndView AnswerAnswer: B
Which Security profile should be applied?
An administrator wants to prevent users from submitting corporate credentials in a phishing attack. Which Security profile should be applied?A . antivirusB . anti-spywareC . URL filteringD . vulnerability protectionView AnswerAnswer: B
Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?
Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?A . globalB . intrazoneC . interzoneD . universalView AnswerAnswer: D Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClomCAC
Based on the information, how is the SuperApp traffic affected after the 30 days have passed?
A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based...
Which two security profile types can be attached to a security policy? (Choose two.)
Which two security profile types can be attached to a security policy? (Choose two.)A . antivirusB . DDoS protectionC . threatD . vulnerabilityView AnswerAnswer: A,D
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine. A . ExploitationB . InstallationC . ReconnaissanceD . Act on ObjectiveView AnswerAnswer: A
Which statement is true about Panorama managed devices?
Which statement is true about Panorama managed devices?A . Panorama automatically removes local configuration locks after a commit from PanoramaB . Local configuration locks prohibit Security policy changes for a Panorama managed deviceC . Security policy rules configured on local firewalls always take precedenceD . Local configuration locks can be...
Based on the screenshot what is the purpose of the group in User labelled ''it"?
Based on the screenshot what is the purpose of the group in User labelled ''it"? A . Allows users to access IT applications on all portsB . Allows users in group "DMZ" lo access IT applicationsC . Allows "any" users to access servers in the DMZ zoneD . Allows users...
Which type of address object is "10 5 1 1/0 127 248 2"?
Which type of address object is "10 5 1 1/0 127 248 2"?A . IP subnetB . IP wildcard maskC . IP netmaskD . IP rangeView AnswerAnswer: B
Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP Cto-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures.
Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP Cto-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures. Given...