Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two )

Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two )A . Network Processing Engine B. Single Stream-based Engine C. Policy Engine D. Parallel Processing HardwareView AnswerAnswer: B

February 10, 2023 No Comments READ MORE +

Which action results in the firewall blocking network traffic with out notifying the sender?

Which action results in the firewall blocking network traffic with out notifying the sender?A . Drop B. Deny C. Reset Server D. Reset ClientView AnswerAnswer: B

February 9, 2023 No Comments READ MORE +

Place the following steps in the packet processing order of operations from first to last

DRAG DROP Place the following steps in the packet processing order of operations from first to last. View AnswerAnswer:

February 9, 2023 No Comments READ MORE +

Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?

Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option? A . It defines the SSUTLS encryption strength used to protect the management interface. B. It defines the CA certificate used to verify the client's browser. C. It defines the certificate to send to the...

February 9, 2023 No Comments READ MORE +

Which prevention technique will prevent attacks based on packet count?

Which prevention technique will prevent attacks based on packet count?A . zone protection profile B. URL filtering profile C. antivirus profile D. vulnerability profileView AnswerAnswer: A

February 9, 2023 No Comments READ MORE +

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?A . Active Directory monitoring B. Windows session monitoring C. Windows client probing D. domain controller monitoringView AnswerAnswer: A

February 9, 2023 No Comments READ MORE +

Which object would an administrator create to block access to all high-risk applications?

Which object would an administrator create to block access to all high-risk applications?A . HIP profile B. application filter C. application group D. Vulnerability Protection profileView AnswerAnswer: B Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKECA0

February 9, 2023 No Comments READ MORE +

What is a function of application tags?

What is a function of application tags?A . creation of new zones B. application prioritization C. automated referenced applications in a policy D. IP address allocations in DHCPView AnswerAnswer: C

February 8, 2023 No Comments READ MORE +

What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?

What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?A . every 30 minutes B. every 5 minutes C. once every 24 hours D. every 1 minuteView AnswerAnswer: D

February 8, 2023 No Comments READ MORE +

Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?

Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?A . DoS protection B. URL filtering C. packet buffering D. anti-spywareView AnswerAnswer: A

February 8, 2023 No Comments READ MORE +