What are three valid ways to map an IP address to a username? (Choose three.)
What are three valid ways to map an IP address to a username? (Choose three.)A . using the XML API B. DHCP Relay logs C. a user connecting into a GlobalProtect gateway using a GlobalProtect Agent D. usernames inserted inside HTTP Headers E. WildFire verdict reportsView AnswerAnswer: A,C,D
Which statement is true regarding a Best Practice Assessment?
Which statement is true regarding a Best Practice Assessment?A . The BPA tool can be run only on firewalls B. It provides a percentage of adoption for each assessment data C. The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus...
Which Security profile can you apply to protect against malware such as worms and Trojans?
Which Security profile can you apply to protect against malware such as worms and Trojans?A . data filtering B. antivirus C. vulnerability protection D. anti-spywareView AnswerAnswer: B Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/policy/security-profiles#:~:text=Antivirus%20profiles%20protect%20against%20viruses,as%20well%20as%20spyware%20downloads
Given the screenshot what two types of route is the administrator configuring? (Choose two )
Given the screenshot what two types of route is the administrator configuring? (Choose two ) A . default route B. OSPF C. BGP D. static routeView AnswerAnswer: A
Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)
Which two features can be used to tag a username so that it is included in a dynamic user group? (Choose two.)A . GlobalProtect agent B. XML API C. User-ID Windows-based agent D. log forwarding auto-taggingView AnswerAnswer: B,C
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?
If using group mapping with Active Directory Universal Groups, what must you do when configuring the User-ID?A . Create an LDAP Server profile to connect to the root domain of the Global Catalog server on port 3268 or 3269 for SSL B. Configure a frequency schedule to clear group mapping...
Which feature would be useful for preventing traffic from hosting providers that place few restrictions on content, whose services are frequently used by attackers to distribute illegal or unethical material?
Which feature would be useful for preventing traffic from hosting providers that place few restrictions on content, whose services are frequently used by attackers to distribute illegal or unethical material?A . Palo Alto Networks Bulletproof IP Addresses B. Palo Alto Networks C&C IP Addresses C. Palo Alto Networks Known Malicious...
Which Policy Optimizer feature is shown in the screenshot below?
An administrator is updating Security policy to align with best practices. Which Policy Optimizer feature is shown in the screenshot below?A . Rules without App Controls B. New App Viewer C. Rule Usage D. Unused Unused AppsView AnswerAnswer: C
Which type of address object is "10 5 1 1/0 127 248 2"?
Which type of address object is "10 5 1 1/0 127 248 2"?A . IP subnet B. IP wildcard mask C. IP netmask D. IP rangeView AnswerAnswer: B
What allows a security administrator to preview the Security policy rules that match new application signatures?
What allows a security administrator to preview the Security policy rules that match new application signatures?A . Review Release Notes B. Dynamic Updates-Review Policies C. Dynamic Updates-Review App D. Policy Optimizer-New App ViewerView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/review-new-app-id-impact-on-existing-policy-rules