What is the maximum volume of concurrent administrative account sessions?

What is the maximum volume of concurrent administrative account sessions?A . 2 B. Unlimited C. 10 D. 1View AnswerAnswer: B

July 9, 2023 No Comments READ MORE +

Access to which feature requires the PAN-OS Filtering license?

Access to which feature requires the PAN-OS Filtering license? A. PAN-DB database B. DNS Security A. C. Custom URL categories D. URL external dynamic listsView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-licenses-and-subscriptions.html

July 9, 2023 No Comments READ MORE +

Which type of single unified engine will get this result?

An administrator needs to add capability to perform real-time signature lookups to block or sinkhole all known malware domains. Which type of single unified engine will get this result?A . User-ID B. App-ID C. Security Processing Engine D. Content-IDView AnswerAnswer: D Explanation: Content-IDTM combines a real-time threat prevention engine with...

July 8, 2023 No Comments READ MORE +

Which prevention technique will prevent attacks based on packet count?

Which prevention technique will prevent attacks based on packet count?A . zone protection profile B. URL filtering profile C. antivirus profile D. vulnerability profileView AnswerAnswer: A Explanation: DoS Protection adds another layer of defense against attacks on individual devices, which can succeed if the Zone Protection profile thresholds are above...

July 8, 2023 No Comments READ MORE +

What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?

What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?A . every 30 minutes B. every 5 minutes C. once every 24 hours D. every 1 minuteView AnswerAnswer: D Explanation: Because new WildFire signatures are now available every five minutes, it is...

July 8, 2023 No Comments READ MORE +

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)A . User identification B. Filtration protection C. Vulnerability protection D. Antivirus E. Application identification F. Anti-spywareView AnswerAnswer: ACDEF

July 8, 2023 No Comments READ MORE +

What do you configure if you want to set up a group of objects based on their ports alone?

What do you configure if you want to set up a group of objects based on their ports alone?A . address groups B. custom objects C. application groups D. service groupsView AnswerAnswer: D Explanation: Service = layer 4, Application = layer 7

July 7, 2023 No Comments READ MORE +

Which rule type is appropriate for matching traffic occurring within a specified zone?

Which rule type is appropriate for matching traffic occurring within a specified zone?A . Universal B. Shadowed C. Intrazone D. InterzoneView AnswerAnswer: C

July 7, 2023 No Comments READ MORE +

Based on the information, how is the SuperApp traffic affected after the 30 days have passed?

A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based...

July 7, 2023 No Comments READ MORE +

An address object of type IP Wildcard Mask can be referenced in which part of the configuration?

An address object of type IP Wildcard Mask can be referenced in which part of the configuration?A . Security policy rule B. ACC global filter C. external dynamic list D. NAT address poolView AnswerAnswer: A Explanation: You can use an address object of type IP Wildcard Mask only in a...

July 7, 2023 No Comments READ MORE +