Which profile or policy should be applied to protect against port scans from the internet?
Which profile or policy should be applied to protect against port scans from the internet?A . An App-ID security policy rule to block traffic sourcing from the untrust zoneB . Security profiles to security policy rules for traffic sourcing from the untrust zoneC . Interface management profile on the zone...
Which three sources are used by the firewall as the basis of this score?
The botnet report displays a confidence score of 1 to 5 indicating the likelihood of a botnet infection. Which three sources are used by the firewall as the basis of this score? (Choose three.)A . Bad Certificate ReportsB . Traffic TypeC . Botnet ReportsD . Number of EventsE . Executable...
Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)A . Client ProbingB . TACACSC . eDirectory monitoringD . SNMP serverE . Lotus DominoF . RADIUSG . Active Directory monitoringView AnswerAnswer: A,B,F Explanation: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-id-concepts/user-mapping
How many recursion levels are supported for compressed files in PAN-OS 8.0?
How many recursion levels are supported for compressed files in PAN-OS 8.0?A . 2B . 5C . 4D . 3View AnswerAnswer: D
In which two cases should the Hardware offering of Panorama be chosen over the Virtual Offering? (Choose two)
In which two cases should the Hardware offering of Panorama be chosen over the Virtual Offering? (Choose two)A . Dedicated Logger Mode is requiredB . Logs per second exceed 10,000C . Appliance needs to be moved into data centerD . Device count is under 100View AnswerAnswer: A,B