Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.) A. on the App Dependency tab in the Commit Status window B. on the Policy Optimizer's Rule Usage page C. on the Application tab in the Security Policy Rule creation window A. D....
Which Security profile should be used?
An administrator would like to protect against inbound threats such as buffer overflows and illegal code execution. Which Security profile should be used? A. Vulnerability protection A. B. Anti-spyware C. URL filtering D. AntivirusView AnswerAnswer: A Explanation: Vulnerability Protection profiles protect against threats entering the network. For example, Vulnerability Protection...
Which two DNS policy actions can the administrator choose in the Anti-Spyware Security Profile?
An administrator wants to prevent hacking attacks through DNS queries to malicious domains. Which two DNS policy actions can the administrator choose in the Anti-Spyware Security Profile? (Choose two.)A . deny B. block C. sinkhole D. overrideView AnswerAnswer: BC
Which statement is true regarding a Best Practice Assessment?
Which statement is true regarding a Best Practice Assessment?A . It runs only on firewalls. B. It shows how current configuration compares to Palo Alto Networks recommendations. C. When guided by an authorized sales engineer, it helps determine the areas of greatest risk where you should focus prevention activities. D....
What combination of Security policy and Security profile actions is correct?
An administrator would like to create a URL Filtering log entry when users browse to any gambling website. What combination of Security policy and Security profile actions is correct?A . Security policy = drop, Gambling category in URL profile = allow B. Security policy = deny. Gambling category in URL...
In which threat profile object would you configure the DNS Security service?
In which threat profile object would you configure the DNS Security service?A . Antivirus B. Anti-Spyware C. WildFire D. URL FilteringView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/dns-security/administration/configure-dns-security/enable-dns-security#:~:text=To%20enable%20DNS%20Security%2C%20you,to%20a%20security%20policy%20rule.
Which rule would continue to allow the file upload to confluence after the update?
An administrator reads through the following Applications and Threats Content Release Notes before an update: Which rule would continue to allow the file upload to confluence after the update? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: B
Which two settings allow you to restrict access to the management interface? (Choose two )
Which two settings allow you to restrict access to the management interface? (Choose two )A . enabling the Content-ID filter B. administrative management services C. restricting HTTP and telnet using App-ID D. permitted IP addressesView AnswerAnswer: AC
How do you reset the hit count on a Security policy rule?
How do you reset the hit count on a Security policy rule?A . select a security policy rule, right click Hit Count > Reset B. with a dataplane reboot C. Device > Setup > Logging and Reporting Settings > Reset Hit Count D. in the CLI, type command reset hitcount...
How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?
How does an administrator schedule an Applications and Threats dynamic update while delaying installation of the update for a certain amount of time?A . Disable automatic updates during weekdays B. Automatically "download and install" but with the "disable new applications" option used C. Automatically "download only" and then install Applications...