Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?

Which filtering criterion is used to determine users to be included as members of a dynamic user group (DUG)?A . Security policy ruleB . TagC . Login IDD . IP addressView AnswerAnswer: B

September 13, 2024 No Comments READ MORE +

Which two features are key in preventing unknown targeted attacks? (Choose two)

Which two features are key in preventing unknown targeted attacks? (Choose two)A . nighty botnet reportB . App-ID with the Zero Trust modelC . WildFire Cloud threat analysisD . Single Pass Parallel Processing (SP3)View AnswerAnswer: B,C

September 13, 2024 No Comments READ MORE +

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?

The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?A . WildFireB . DNS SecurityC . Threat PreventionD . loT SecurityView AnswerAnswer: B

September 13, 2024 No Comments READ MORE +

Which feature of PAN-OS will address these requirements?

A customer requires an analytics tool with the following attributes: - Uses the logs on the firewall to detect actionable events on the network - Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network - Pinpoints the area of risk...

September 13, 2024 No Comments READ MORE +

Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?

Which component is needed for a large-scale deployment of NGFWs with multiple Panorama Management Servers?A . M-600 applianceB . Panorama Interconnect pluginC . Panorama Large Scale VPN (LSVPN) pluginD . Palo Alto Networks Cluster licenseView AnswerAnswer: B

September 12, 2024 No Comments READ MORE +

The Palo Ao Networks Cloud Identity Engino (CIE) includes which service that supports identity Providers (ldP)?

The Palo Ao Networks Cloud Identity Engino (CIE) includes which service that supports identity Providers (ldP)?A . Directory Sync and Cloud Authentication Service that support IdP ung SAML 2.0 and OAuth2B . Cloud Authentication Service that supports IdP using SAML 2.0 and OAuth2C . Directory Sync and Cloud Authentication Service...

September 12, 2024 No Comments READ MORE +

How frequently do WildFire signatures move into the antivirus database?

How frequently do WildFire signatures move into the antivirus database?A . every 24 hoursB . every 12 hoursC . once a weekD . every 1 hourView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/wildfire/9-0/wildfire-admin/wildfire-overview/wildfire-concepts/wildfire-signatures

September 12, 2024 No Comments READ MORE +

Which three mechanisms are valid for enabling user mapping? (Choose three.)

Which three mechanisms are valid for enabling user mapping? (Choose three.)A . Captive PortalB . Domain server monitoringC . Reverse DNS lookupD . User behaviour recognitionE . Client probingView AnswerAnswer: A,B,E

September 11, 2024 No Comments READ MORE +

Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?

A customer is designing a private data center to host their new web application along with a separate headquarters for users. Which cloud-delivered security service (CDSS) would be recommended for the headquarters only?A . Threat PreventionB . DNS SecurityC . WildFireD . Advanced URL Filtering (AURLF)View AnswerAnswer: D

September 11, 2024 No Comments READ MORE +

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?

Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?A . it requires the Vulnerability Protection profile to be enabledB . DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updatesC . infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be...

September 11, 2024 No Comments READ MORE +