Which event will happen if an administrator uses an Application Override Policy?

Which event will happen if an administrator uses an Application Override Policy?A . Threat-ID processing time is decreased.B . The Palo Alto Networks NGFW stops App-ID processing at Layer 4.C . The application name assigned to the traffic by the security rule is written to the Traffic log.D . App-ID...

July 12, 2021 No Comments READ MORE +

Which User-ID method should be configured to map IP addresses to usernames for users connected through a terminal server?

Which User-ID method should be configured to map IP addresses to usernames for users connected through a terminal server?A . port mappingB . server monitoringC . client probingD . XFF headersView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-admin/user-id/map-ip-addresses-to-users/configure-user-mapping-for-terminal-server-users

July 12, 2021 No Comments READ MORE +

Which feature prevents the submission of corporate login information into website forms?

Which feature prevents the submission of corporate login information into website forms?A . Data filteringB . User-IDC . File blockingD . Credential phishing preventionView AnswerAnswer: D Explanation: Reference: https://www.paloaltonetworks.com/cyberpedia/how-the-next-generation-security-platform-contributes-to-gdpr-compliance “Credential phishing prevention works by scanning username and password submissions to websites and comparing those submissions against valid corporate credentials. You...

July 12, 2021 No Comments READ MORE +

A session in the Traffic log is reporting the application as “incomplete.” What does “incomplete” mean?

A session in the Traffic log is reporting the application as “incomplete.” What does “incomplete” mean?A . The three-way TCP handshake was observed, but the application could not be identified.B . The three-way TCP handshake did not complete.C . The traffic is coming across UDP, and the application could not...

July 11, 2021 No Comments READ MORE +

Which profile is the cause of the missing Policies tab?

An administrator logs in to the Palo Alto Networks NGFW and reports that the WebUI is missing the Policies tab. Which profile is the cause of the missing Policies tab?A . Admin RoleB . WebUIC . AuthenticationD . AuthorizationView AnswerAnswer: A

July 11, 2021 No Comments READ MORE +

Which option is part of the content inspection process?

Which option is part of the content inspection process?A . Packet forwarding processB . SSL Proxy re-encryptC . IPsec tunnel encryptionD . Packet egress processView AnswerAnswer: B Explanation: http://live.paloaltonetworks.com//t5/image/serverpage/image-id/12862i950F549C7D4E6309

July 11, 2021 No Comments READ MORE +

Which feature can provide NGFWs with User-ID mapping information?

Which feature can provide NGFWs with User-ID mapping information?A . GlobalProtectB . Web CaptchaC . Native 802.1q authenticationD . Native 802.1x authenticationView AnswerAnswer: A

July 11, 2021 No Comments READ MORE +

Which action would enable the firewalls to send their pre-existing logs to Panorama?

An administrator is using Panorama and multiple Palo Alto Networks NGFWs. After upgrading all devices to the latest PAN-OS® software, the administrator enables log forwarding from the firewalls to Panoram A. Pre-existing logs from the firewalls are not appearing in Panoram A. Which action would enable the firewalls to send...

July 11, 2021 No Comments READ MORE +

A web server is hosted in the DMZ, and the server is configured to listen for incoming connections only on TCP port 8080. A Security policy rule allowing access from the Trust zone to the DMZ zone need to be configured to enable we browsing access to the server.

A web server is hosted in the DMZ, and the server is configured to listen for incoming connections only on TCP port 8080. A Security policy rule allowing access from the Trust zone to the DMZ zone need to be configured to enable we browsing access to the server. Which...

July 10, 2021 No Comments READ MORE +

Which option would achieve this result?

An administrator sees several inbound sessions identified as unknown-tcp in the Traffic logs. The administrator determines that these sessions are form external users accessing the company’s proprietary accounting application. The administrator wants to reliably identify this traffic as their accounting application and to scan this traffic for threats. Which option...

July 10, 2021 No Comments READ MORE +