In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A
Which statement is true regarding a Prevention Posture Assessment?
Which statement is true regarding a Prevention Posture Assessment?A . The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categoriesB . It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network...
Which two configuration settings shown are not the default? (Choose two.)
Which two configuration settings shown are not the default? (Choose two.) A . Enable Security LogB . Server Log Monitor Frequency (sec)C . Enable SessionD . Enable ProbingView AnswerAnswer: B,C
Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?
Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?A . ApertureB . AutoFocusC . Parisma SaaSD . GlobalProtectView AnswerAnswer: C
Which URL profiling action does not generate a log entry when a user attempts to access that URL?
Which URL profiling action does not generate a log entry when a user attempts to access that URL?A . OverrideB . AllowC . BlockD . ContinueView AnswerAnswer: B References:
Which two security profile types can be attached to a security policy? (Choose two.)
Which two security profile types can be attached to a security policy? (Choose two.)A . antivirusB . DDoS protectionC . threatD . vulnerabilityView AnswerAnswer: A,D
Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?
Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?A . Windows-based agent deployed on the internal networkB . PAN-OS integrated agent deployed on the internal networkC . Citrix terminal server deployed on the internal networkD . Windows-based...
In a security policy what is the quickest way to rest all policy rule hit counters to zero?
In a security policy what is the quickest way to rest all policy rule hit counters to zero?A . Use the CLI enter the command reset rules allB . Highlight each rule and use the Reset Rule Hit Counter > Selected Rules.C . use the Reset Rule Hit Counter >...
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?A . ManagementB . High AvailabilityC . AggregateD . AggregationView AnswerAnswer: C