When is the content inspection performed in the packet flow process?
When is the content inspection performed in the packet flow process?A . after the application has been identified B. after the SSL Proxy re-encrypts the packet C. before the packet forwarding process D. before session lookupView AnswerAnswer: A Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0
Which data flow direction is protected in a zero trust firewall deployment that is not protected in a perimeter-only firewall deployment?
Which data flow direction is protected in a zero trust firewall deployment that is not protected in a perimeter-only firewall deployment?A . outbound B. north south C. inbound D. east westView AnswerAnswer: D
Which statement best describes the use of Policy Optimizer?
Which statement best describes the use of Policy Optimizer?A . Policy Optimizer can display which Security policies have not been used in the last 90 days B. Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have unused applications C. Policy Optimizer can add or...
What must be configured before setting up Credential Phishing Prevention?
What must be configured before setting up Credential Phishing Prevention?A . Anti Phishing Block Page B. Threat Prevention C. Anti Phishing profiles D. User-IDView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-credential-phishing/set-up-credential-phishing-prevention
Which Security policy rule is blocking the youtube application?
The firewall sends employees an application block page when they try to access Youtube. Which Security policy rule is blocking the youtube application?A . intrazone-default B. Deny Google C. allowed-security services D. interzone-defaultView AnswerAnswer: D
When is the content inspection performed in the packet flow process?
When is the content inspection performed in the packet flow process?A . after the application has been identified B. after the SSL Proxy re-encrypts the packet C. before the packet forwarding process D. before session lookupView AnswerAnswer: A Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g00000 0ClVHCA0
Which administrative management services can be configured to access a management interface?
Which administrative management services can be configured to access a management interface?A . HTTP, CLI, SNMP, HTTPS B. HTTPS, SSH telnet SNMP C. SSH: telnet HTTP, HTTPS D. HTTPS, HTTP. CLI, APIView AnswerAnswer: D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/management-interfaces You can use the following user interfaces to manage the Palo Alto Networks firewall:...
What combination of Security policy and Security profile actions is correct?
An administrator would like to create a URL Filtering log entry when users browse to any gambling website. What combination of Security policy and Security profile actions is correct?A . Security policy = drop, Gambling category in URL profile = allow B. Security policy = deny. Gambling category in URL...
What is the main function of the Test Policy Match function?
What is the main function of the Test Policy Match function?A . verify that policy rules from Expedition are valid B. confirm that rules meet or exceed the Best Practice Assessment recommendations C. confirm that policy rules in the configuration are allowing/denying the correct traffic D. ensure that policy rules...
What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?
What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?A . every 5 minutes B. every 1 minute C. every 24 hours D. every 30 minutesView AnswerAnswer: B Explanation: