Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?
Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?A . Threat PreventionB . DNS SecurityC . WildFireD . URL FilteringView AnswerAnswer: D
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?
Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?A . ExpeditionB . Cortex XDRC . AutoFocusD . App-IDView AnswerAnswer: B
Which network analysis tool can be used to record packet captures?
Which network analysis tool can be used to record packet captures?A . Smart IP ScannerB . WiresharkC . Angry IP ScannerD . NetmanView AnswerAnswer: B
Which technique changes protocols at random during a session?
Which technique changes protocols at random during a session?A . use of non-standard portsB . port hoppingC . hiding within SSL encryptionD . tunneling within commonly used servicesView AnswerAnswer: B
Which option would be an example of PII that you need to prevent from leaving your enterprise network?
Which option would be an example of PII that you need to prevent from leaving your enterprise network?A . Credit card numberB . Trade secretC . National security informationD . A symmetric encryption keyView AnswerAnswer: A