Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)

Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)A . eDirectory monitoringB . Client ProbingC . SNMP serverD . TACACSE . Active Directory monitoringF . Lotus DominoG . RADIUSView AnswerAnswer: B,D,G Explanation: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-id-concepts/user-mapping

October 2, 2021 No Comments READ MORE +

Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)

Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)A . QuarantineB . AllowC . ResetD . RedirectE . DropF . AlertView AnswerAnswer: B,C,E,F Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/policy/anti-spyware-profiles.html

October 2, 2021 No Comments READ MORE +

Which profile or policy should be applied to protect against port scans from the internet?

Which profile or policy should be applied to protect against port scans from the internet?A . Interface management profile on the zone of the ingress interfaceB . Zone protection profile on the zone of the ingress interfaceC . An App-ID security policy rule to block traffic sourcing from the untrust...

October 1, 2021 No Comments READ MORE +

Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)

Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)A . Include all traffic types in decryption policyB . Inability to access websitesC . Exclude certain types of traffic in decryption policyD . Deploy decryption setting all at one timeE . Ensure throughput...

October 1, 2021 No Comments READ MORE +

What are three considerations when deploying User-ID? (Choose three.)

What are three considerations when deploying User-ID? (Choose three.)A . Specify included and excluded networks when configuring User-IDB . Only enable User-ID on trusted zonesC . Use a dedicated service account for User-ID services with the minimal permissions necessaryD . User-ID can support a maximum of 15 hopsE . Enable...

October 1, 2021 No Comments READ MORE +

Which three new script types can be analyzed in WildFire? (Choose three.)

Which three new script types can be analyzed in WildFire? (Choose three.)A . VBScriptB . JScriptC . MonoScriptD . PythonScriptE . PowerShell ScriptView AnswerAnswer: A,B,E Explanation: The WildFire cloud is capable of analyzing the following script types: ✑ JScript (.js) ✑ VBScript (.vbs) ✑ PowerShell Script (.ps1) https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/latest-wildfire-cloud-features/script-sample-support

September 30, 2021 No Comments READ MORE +

When having a customer pre-sales call, which aspects of the NGFW should be covered?

When having a customer pre-sales call, which aspects of the NGFW should be covered?A . The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networksB . The Palo Alto Networks-developed URL...

September 30, 2021 No Comments READ MORE +

How frequently should the related signatures schedule be set?

Palo Alto Networks publishes updated Command-and-Control signatures . How frequently should the related signatures schedule be set?A . Once a dayB . Once a weekC . Once every minuteD . Once an hourView AnswerAnswer: B

September 30, 2021 No Comments READ MORE +

Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes?

A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other higher level...

September 29, 2021 No Comments READ MORE +

What are two advantages of the DNS Sinkholing feature? (Choose two.)

What are two advantages of the DNS Sinkholing feature? (Choose two.)A . It forges DNS replies to known malicious domains.B . It monitors DNS requests passively for malware domains.C . It can be deployed independently of an Anti-Spyware Profile.D . It can work upstream from the internal DNS server.View AnswerAnswer:...

September 28, 2021 No Comments READ MORE +