Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)

Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)A . on the App Dependency tab in the Commit Statuswindow B. on the Policy Optimizer'sRule Usagepage C ontheApplication tab in the Security Policy Rulecreation window C. ontheObjects>Applicationsbrowser pagesView AnswerAnswer: A,C Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/use-application-objects-in-policy/resolve-application-dependencies.html

February 2, 2023 No Comments READ MORE +

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?A . It functions like PAN-DB and requires activation through the app portal. B. It removes the 100K limit for DNS entries for the downloaded DNS updates. C. IT eliminates the need for dynamic DNS updates....

February 2, 2023 No Comments READ MORE +

Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?

You receive notification about new malware that infects hosts through malicious files transferred by FTP. Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?A . URL Filtering profile applied to inbound Security policy rules. B. Data Filtering profile applied...

February 2, 2023 No Comments READ MORE +

How should you configure the firewall to allow access to any office-suite application?

You need to allow users to access the officeCsuite application of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre Office B. Create an Application Group and add business-systems to...

February 1, 2023 No Comments READ MORE +

Selecting the option to revert firewall changes will replace what settings?

Selecting the option to revert firewall changes will replace what settings?A . The running configuration with settings from the candidate configuration B. The candidate configuration with settings from the running configuration C. The device state with settings from another configuration D. Dynamic update scheduler settingsView AnswerAnswer: A

February 1, 2023 No Comments READ MORE +

Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)

Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)A . Security policy rules inspect but do not block traffic. B. Security Profile should be used only on allowed traffic. C. Security Profile are attached to security policy rules. D. Security Policy rules are attached...

February 1, 2023 No Comments READ MORE +

Which tab would an administrator click to create an address object?

Which tab would an administrator click to create an address object?A . Device B. Policies C. Monitor D. ObjectsView AnswerAnswer: D

February 1, 2023 No Comments READ MORE +

Based on the screenshot presented which column contains the link that when clicked opens a window to display all applications matched to the policy rule?

Based on the screenshot presented which column contains the link that when clicked opens a window to display all applications matched to the policy rule? A . Apps Allowed B. Name C. Apps Seen D. ServiceView AnswerAnswer: C

February 1, 2023 No Comments READ MORE +

What is the most appropriate NAT policy to achieve this?

An administrator wants to create a NAT policy to allow multiple source IP addresses to be translated to the same public IP address. What is the most appropriate NAT policy to achieve this?A . Dynamic IP and Port B. Dynamic IP C. Static IP D. DestinationView AnswerAnswer: A

February 1, 2023 No Comments READ MORE +

Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone.

Users from the internal zone need to be allowed to Telnet into a server in the DMZ zone. Complete the security policy to ensure only Telnet is allowed. Security Policy: Source Zone: Internal to DMZ Zone __________services “Application defaults”, and action = AllowA . Destination IP: 192.168.1.123/24 B. Application =...

January 31, 2023 No Comments READ MORE +