Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?A . GlobalProtect B. AutoFocus C. Aperture D. PanoramaView AnswerAnswer: A
Which two Security policy rules will accomplish this configuration?
CORRECT TEXT Refer to the exhibit. An administrator is using DNAT to map two servers to a single public IP address. Traffic will be steered to the specific server based on the application, where Host A (10.1.1.100) receives HTTP traffic and Host B (10.1.1.101) receives SSH traffic. Which two Security...
What must be configured before setting up Credential Phishing Prevention?
What must be configured before setting up Credential Phishing Prevention?A . Anti Phishing Block Page B. Threat Prevention C. Anti Phishing profiles D. User-IDView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-credential-phishing/set-up-credential-phishing-prevention
Which option lists the attributes that are selectable when setting up an Application filters?
Which option lists the attributes that are selectable when setting up an Application filters?A . Category, Subcategory, Technology, and Characteristic B. Category, Subcategory, Technology, Risk, and Characteristic C. Name, Category, Technology, Risk, and Characteristic D. Category, Subcategory, Risk, Standard Ports, and TechnologyView AnswerAnswer: B Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/objects/objects-application-filters
URL categories can be used as match criteria on which two policy types? (Choose two.)
URL categories can be used as match criteria on which two policy types? (Choose two.)A . authentication B. decryption C application override C. NATView AnswerAnswer: A,B Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-category-as-policy-match-criteria.html
Which three interface deployment methods can be used to block traffic flowing through the Palo Alto Networks firewall? (Choose three.)
Which three interface deployment methods can be used to block traffic flowing through the Palo Alto Networks firewall? (Choose three.)A . Layer 2 B. Virtual Wire C. Tap D. Layer 3 E. HAView AnswerAnswer: B,D,E
Which utility should the company use to identify out-of-date or unused rules on the firewall?
A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago . Which utility should the company use to identify out-of-date or unused rules on the firewall?A . Rule Usage Filter > No App Specified B. Rule Usage Filter >Hit Count > Unused in...
Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?
An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?A . branch office traffic B. north-south traffic C. perimeter traffic D. east-west...
Match the cyber-attack lifecycle stage to its correct description
DRAG DROP Match the cyber-attack lifecycle stage to its correct description. View AnswerAnswer:
Which three dynamic routing protocols are supported by the NGFW Virtual Router for this purpose?
A network administrator is required to use a dynamic routing protocol for network connectivity. Which three dynamic routing protocols are supported by the NGFW Virtual Router for this purpose? (Choose three.)A . RIP B. OSPF C. IS-IS D. EIGRP E. BGPView AnswerAnswer: A,B,E