What is the quickest way to reset the hit counter to zero in all the security policy rules?
Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping. What is the quickest way to reset the hit counter to zero in all the security policy rules?A . At the CLI enter the command reset rules...
Based on the screenshot what is the purpose of the group in User labelled ''it"?
Based on the screenshot what is the purpose of the group in User labelled ''it"? A . Allows users to access IT applications on all ports B. Allows users in group "DMZ" lo access IT applications C. Allows "any" users to access servers in the DMZ zone D. Allows users...
Match the cyber-attack lifecycle stage to its correct description
DRAG DROP Match the cyber-attack lifecycle stage to its correct description. View AnswerAnswer:
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)A . User identification B. Filtration protection C. Vulnerability protection D. Antivirus E. Application identification F. Anti-spywareView AnswerAnswer: A,C,D,E,F
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine. A . Exploitation B. Installation C. Reconnaissance D. Act on the ObjectiveView AnswerAnswer: A
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?A . GlobalProtect B. AutoFocus C. Aperture D. PanoramaView AnswerAnswer: A Explanation: GlobalProtect: GlobalProtect safeguards your mobile workforce by inspecting all traffic using your next-generation firewalls deployed as internet gateways, whether...
Which statement accurately describes how the firewall will apply an action to matching traffic?
Assume that traffic matches a Security policy rule but the attached Security Profiles is configured to block matching traffic Which statement accurately describes how the firewall will apply an action to matching traffic?A . If it is an allowed rule, then the Security Profile action is applied last B. If...
Which interface type can use virtual routers and routing protocols?
Which interface type can use virtual routers and routing protocols?A . Tap B. Layer3 C. Virtual Wire D. Layer2View AnswerAnswer: B
At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?
At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?A . after clicking Check New in the Dynamic Update window B. after connecting the firewall configuration C. after downloading the update D. after installing the updateView AnswerAnswer: A...
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured?
If users from the Trusted zone need to allow traffic to an SFTP server in the DMZ zone, how should a Security policy with App-ID be configured? A) B) C) D) A . Option A B. Option B C. Option C D. Option DView AnswerAnswer: D