Order the steps needed to create a new security zone with a Palo Alto Networks firewall
DRAG DROP Order the steps needed to create a new security zone with a Palo Alto Networks firewall. View AnswerAnswer: Explanation: Step 1 C Select network tab Step 2 C Select zones from the list of available items Step 3 C Select Add Step 4 C Specify Zone Name Step...
Which policy achieves the desired results?
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications Which policy achieves the desired results? A) B) C) D) A . OptionB . OptionC . OptionD . OptionView AnswerAnswer: C
Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)
Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)A . XML APIB . log forwarding auto-taggingC . GlobalProtect agentD . User-ID Windows-based agentView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions
Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?
Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?A . Review PoliciesB . Review AppsC . Pre-analyzeD . Review App MatchesView AnswerAnswer: A
Which method allows the employees to access the PowerBall Lottery website but without unblocking access to the “gambling” URL category?
The PowerBall Lottery has reached an unusually high value this week. Your company has decided to raise morale by allowing employees to access the PowerBall Lottery website (www.powerball.com) for just this week. However, the company does not want employees to access any other websites also listed in the URL filtering...
In a security policy what is the quickest way to rest all policy rule hit counters to zero?
In a security policy what is the quickest way to rest all policy rule hit counters to zero?A . Use the CLI enter the command reset rules allB . Highlight each rule and use the Reset Rule Hit Counter > Selected Rules.C . use the Reset Rule Hit Counter >...
Which two settings allow you to restrict access to the management interface? (Choose two)
Which two settings allow you to restrict access to the management interface? (Choose two)A . enabling the Content-ID filterB . administrative management servicesC . restricting HTTP and telnet using App-IDD . permitted IP addressesView AnswerAnswer: A,C
Which statements is true regarding a Heatmap report?
Which statements is true regarding a Heatmap report?A . When guided by authorized sales engineer, it helps determine te areas of greatest security risk.B . It provides a percentage of adoption for each assessment area.C . It runs only on firewall.D . It provides a set of questionnaires that help...
Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two)
Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two)A . Network Processing EngineB . Single Stream-based EngineC . Policy EngineD . Parallel Processing HardwareView AnswerAnswer: B
How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?
Assume a custom URL Category Object of "NO-FILES" has been created to identify a specific website How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?A . Create a Security policy with a URL Filtering profile that references the site access setting of...