Match the cyber-attack lifecycle stage to its correct description
DRAG DROP Match the cyber-attack lifecycle stage to its correct description. View AnswerAnswer:
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)A . User identification B. Filtration protection C. Vulnerability protection D. Antivirus E. Application identification F. Anti-spywareView AnswerAnswer: A,C,D,E,F
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine. A . Exploitation B. Installation C. Reconnaissance D. Act on the ObjectiveView AnswerAnswer: A
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?A . GlobalProtect B. AutoFocus C. Aperture D. PanoramaView AnswerAnswer: A Explanation: GlobalProtect: GlobalProtect safeguards your mobile workforce by inspecting all traffic using your next-generation firewalls deployed as internet gateways, whether...
Which statement accurately describes how the firewall will apply an action to matching traffic?
Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic Which statement accurately describes how the firewall will apply an action to matching traffic?A . If it is an allowed rule, then the Security Profile action is applied last B. If...
Which interface type can use virtual routers and routing protocols?
Which interface type can use virtual routers and routing protocols?A . Tap B. Layer3 C. Virtual Wire D. Layer2View AnswerAnswer: B
At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?
At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?A . after clicking Check New in the Dynamic Update window B. after connecting the firewall configuration C. after downloading the update D. after installing the updateView AnswerAnswer: A...
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured?
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: D
Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two )
Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two )A . Network Processing Engine B. Single Stream-based Engine C. Policy Engine D. Parallel Processing HardwareView AnswerAnswer: B
Which action results in the firewall blocking network traffic with out notifying the sender?
Which action results in the firewall blocking network traffic with out notifying the sender?A . Drop B. Deny C. Reset Server D. Reset ClientView AnswerAnswer: B