What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?
Prior to a maintenance-window activity, the administrator would like to make a backup of only the running configuration to an external location . What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?A . save named configuration snapshot B. export device...
Which statement is correct about the information displayed?
An administrator is reviewing the Security policy rules shown in the screenshot below. Which statement is correct about the information displayed?A . Eleven rules use the "Infrastructure* tag. B. The view Rulebase as Groups is checked. C. There are seven Security policy rules on this firewall. D. Highlight Unused Rules...
Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?
You receive notification about a new malware that infects hosts An infection results in the infected host attempting to contact a command-and-control server. Which Security Profile when applied to outbound Security policy rules detects and prevents this threat from establishing a command-and-control connection?A . Antivirus Profile B. Data Filtering Profile...
What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones?
View the diagram. What is the most restrictive yet fully functional rule to allow general Internet and SSH traffic into both the DMZ and Untrust/lnternet zones from each of the lOT/Guest and Trust Zones? A) B) C) D) A . Option A B. Option B C. Option C D. Option...
Which two configuration settings shown are not the default? (Choose two.)
Which two configuration settings shown are not the default? (Choose two.) A . Enable Security Log B. Server Log Monitor Frequency (sec) C. Enable Session D. Enable ProbingView AnswerAnswer: B,C
Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?
You receive notification about new malware that infects hosts through malicious files transferred by FTP. Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?A . URL Filtering profile applied to inbound Security policy rules. B. Data Filtering profile applied...
How are Application Fillers or Application Groups used in firewall policy?
How are Application Fillers or Application Groups used in firewall policy?A . An Application Filter is a static way of grouping applications and can be configured as a nested member of an Application Group B. An Application Filter is a dynamic way to group applications and can be configured as...
In which profile should you configure the DNS Security feature?
In which profile should you configure the DNS Security feature?A . URL Filtering Profile B. Anti-Spyware Profile C. Zone Protection Profile D. Antivirus ProfileView AnswerAnswer: B Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/dns-security/enable-dnssecurity.html
Match the Cyber-Attack Lifecycle stage to its correct description
DRAG DROP Match the Cyber-Attack Lifecycle stage to its correct description. View AnswerAnswer: Explanation: Reconnaissance C stage where the attacker scans for network vulnerabilities and services that can be exploited. Installation C stage where the attacker will explore methods such as a root kit to establish persistence Command and Control...
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?A . Windows session monitoring via a domain controller B. passive server monitoring using the Windows-based agent C. Captive Portal D. passive server monitoring using a PAN-OS integrated User-ID agentView AnswerAnswer:...