Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?
Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?A . global B. intrazone C. interzone D. universalView AnswerAnswer: C Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/software-and-content-updates/dynamic-contentupdates.html#:~:text=WildFire%20signature%20updates%20are%20made,within%20a%20minute%20of %20availability
Which Security policy action should the administrator select?
An administrator would like to silently drop traffic from the internet to a ftp server. Which Security policy action should the administrator select?A . Reset-server B. Block C. Deny D. DropView AnswerAnswer: D
What are the two default behaviors for the intrazone-default policy? (Choose two.)
What are the two default behaviors for the intrazone-default policy? (Choose two.)A . Allow B. Logging disabled C. Log at Session End D. DenyView AnswerAnswer: A,B
Which plane on a Palo alto networks firewall provides configuration logging and reporting functions on a separate processor?
Which plane on a Palo alto networks firewall provides configuration logging and reporting functions on a separate processor?A . data B. network processing C. management D. security processingView AnswerAnswer: C
If a virus gets detected, how wilt the firewall handle the traffic?
An administrator configured a Security policy rule with an Antivirus Security profile. The administrator did not change the action (or the profile. If a virus gets detected, how wilt the firewall handle the traffic?A . It allows the traffic because the profile was not set to explicitly deny the traffic....
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . Weaponization B. Reconnaissance C. Installation D. Command and Control E. ExploitationView AnswerAnswer: A
Which security policy action causes this?
An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available. Which security policy action causes this?A . Reset server B. Reset both C. Deny D. DropView AnswerAnswer: C Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/manage- configuration backups/revert-firewall-configuration- changes.html
Which log setting configuration is consistent with best practices tor normal traffic?
An administrator is reviewing another administrator s Security policy log settings Which log setting configuration is consistent with best practices tor normal traffic?A . Log at Session Start and Log at Session End both enabled B. Log at Session Start disabled Log at Session End enabled C. Log at Session...
What is an advantage for using application tags?
What is an advantage for using application tags?A . They are helpful during the creation of new zones B. They help with the design of IP address allocations in DHCP. C. They help content updates automate policy updates D. They help with the creation of interfacesView AnswerAnswer: C
How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?
Assume a custom URL Category Object of "NO-FILES" has been created to identify a specific website How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?A . Create a Security policy with a URL Filtering profile that references the site access setting of...