How should the site be made available?

Access to a business site is blocked by URL Filtering inline machine learning (ML) and considered as a false-positive. How should the site be made available?A . Disable URL Filtering inline MLB . Create a custom URL category and add it to the Security policyC . Create a custom URL...

September 24, 2024No CommentsREAD MORE +

A WildFire subscription is required for which two of the following activities? (Choose two)

A WildFire subscription is required for which two of the following activities? (Choose two)A . Filter uniform resource locator (URL) sites by category.B . Forward advanced file types from the firewall for analysis.C . Use the WildFire Application Programming Interface (API) to submit website links for analysisD . Enforce policy...

September 23, 2024No CommentsREAD MORE +

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)

In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)A . SaaS reportsB . data filtering logsC . WildFire analysis reportsD . threat logsE . botnet reportsView AnswerAnswer: C,D,E

September 22, 2024No CommentsREAD MORE +

In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)

In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)A . graywareB . command and control (C2)C . benignD . governmentE . malwareView AnswerAnswer: A,C,E

September 21, 2024No CommentsREAD MORE +

Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)

Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)A . Enable User Credential DetectionB . Enable User-IDC . Define a Secure Sockets Layer (SSL) decryption rule baseD . Enable App-IDE . Define a uniform resource locator (URL) Filtering profileView AnswerAnswer: B,C,E

September 21, 2024No CommentsREAD MORE +

What are two steps in this process?

A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture. What are two steps in this process? (Choose two.)A . Validate user identities through authenticationB . Gain visibility of and control over applications and functionality in the traffic flow using...

September 17, 2024No CommentsREAD MORE +

What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)

What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)A . Add the user to an external dynamic list (EDL).B . Tag the user using Panorama or the Web Ul of the firewall.C . Tag the user through the firewalls XML API.D ....

September 17, 2024No CommentsREAD MORE +

What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?

What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?A . Run a Perl script to regularly check for updates and alert when one is releasedB . Monitor update announcements and manually push updates to CrewallC . Store updates on an...

September 17, 2024No CommentsREAD MORE +

What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?

What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?A . It eliminates of the necessity for dynamic analysis in the cloudB . It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivityC . It...

September 17, 2024No CommentsREAD MORE +

What will best enhance security of a production online system while minimizing the impact for the existing network?

What will best enhance security of a production online system while minimizing the impact for the existing network?A . Layer 2 interfacesB . active / active high availability (HA)C . Virtual wireD . virtual systemsView AnswerAnswer: C

September 17, 2024No CommentsREAD MORE +