What new functionality is provided in PAN-OS 5.0 by Palo Alto Networks URL Filtering Database (PAN-DB)?
What new functionality is provided in PAN-OS 5.0 by Palo Alto Networks URL Filtering Database (PAN-DB)?A . The "Log Container Page Only" option can be employed in a URL-Filtering policy to reduce the number of logging events.B . URL-Filtering can now be employed as a match condition in Security policyC...
Which option, when enabled with the correct threshold, would mitigate this attack without dropping legitimate traffic to other hosts inside the network?
A Palo Alto Networks firewall is being targeted by an NTP Amplification attack and is being flooded with tens of thousands of bogus UDP connections per second to a single destination IP address and port. Which option, when enabled with the correct threshold, would mitigate this attack without dropping legitimate...
Which method will show the global counters associated with the traffic after configuring the appropriate packet filters?
A firewall administrator is troubleshooting problems with traffic passing through the Palo Alto Networks firewall. Which method will show the global counters associated with the traffic after configuring the appropriate packet filters?A . From the CLI, issue the show counter interface command for the egress interface.B . From the GUI,...
Which three processor types are found on the data plane of a PA-5050? Choose 3 answers
Which three processor types are found on the data plane of a PA-5050? Choose 3 answersA . Multi-Core Security ProcessorB . Signature Match ProcessorC . Network ProcessorD . Protocol Decoder ProcessorE . Management ProcessorView AnswerAnswer: A,B,C Explanation: Reference: https://www.paloaltonetworks.com/content/dam/paloaltonetworks-com/en_US/assets/pdf/whitepapers/single-pass-parallel-processing-architecture.pdf page 8
When a user logs in via Captive Portal, their user information can be checked against:
When a user logs in via Captive Portal, their user information can be checked against:A . Terminal Server AgentB . Security LogsC . XML APID . RadiusView AnswerAnswer: D
When creating an application filter, which of the following is true?
When creating an application filter, which of the following is true?A . They are used by malwareB . Excessive bandwidth may be used as a filter match criteriaC . They are called dynamic because they automatically adapt to new IP addressesD . They are called dynamic because they will automatically...
Which action will show whether the downloaded file has been blocked by a Security Profile?
A user is reporting that they cannot download a PDF file from the internet. Which action will show whether the downloaded file has been blocked by a Security Profile?A . Filter the Session Browser for all sessions from the user with the application "adobe".B . Filter the System log for...
The WildFire Cloud or WF-500 appliance provide information to which two Palo Alto Networks security services? Choose 2 answers
The WildFire Cloud or WF-500 appliance provide information to which two Palo Alto Networks security services? Choose 2 answersA . Threat PreventionB . App-IDC . URL FilteringD . PAN-OSE . GlobalProtect Data FileView AnswerAnswer: A,E Explanation: Reference: https://www.paloaltonetworks.com/products/technologies/wildfire.html
Which best describes how Palo Alto Networks firewall rules are applied to a session?
Which best describes how Palo Alto Networks firewall rules are applied to a session?A . last match appliedB . first match appliedC . all matches appliedD . most specific match appliedView AnswerAnswer: B
When configuring Admin Roles for Web UI access, what are the available access levels?
When configuring Admin Roles for Web UI access, what are the available access levels?A . Enable and Disable onlyB . None, Superuser, Device AdministratorC . Allow and Deny onlyD . Enable, Read-Only and DisableView AnswerAnswer: D