Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?
A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?A . Windows-based agent on a domain controllerB . Captive PortalC . Citrix terminal...
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
Which the app-ID application will you need to allow in your security policy to use facebook-chat?A . facebook-emailB . facebook-baseC . facebookD . facebook-chatView AnswerAnswer: B, D
Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?
Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server. Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?A . antivirus profile applied...
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?A . Windows session monitoring via a domain controllerB . passive server monitoring using the Windows-based agentC . Captive PortalD . passive server monitoring using a PAN-OS integrated User-ID agentView AnswerAnswer:...
Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?
An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?A . branch office trafficB . north-south trafficC . perimeter trafficD . east-west...
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine. A . ExploitationB . InstallationC . ReconnaissanceD . Act on ObjectiveView AnswerAnswer: A
Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall?
Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall? A . Signature MatchingB . Network ProcessingC . Security ProcessingD . Security MatchingView AnswerAnswer: A
How often does WildFire release dynamic updates?
How often does WildFire release dynamic updates?A . every 5 minutesB . every 15 minutesC . every 60 minutesD . every 30 minutesView AnswerAnswer: A
Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?
Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?A . Layer 2B . TapC . Layer 3D . Virtual WireView AnswerAnswer: B
How many zones can an interface be assigned with a Palo Alto Networks firewall?
How many zones can an interface be assigned with a Palo Alto Networks firewall?A . twoB . threeC . fourD . oneView AnswerAnswer: D