Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two )
Palo Alto Networks firewall architecture accelerates content map minimizing latency using which two components'? (Choose two )A . Network Processing Engine B. Single Stream-based Engine C. Policy Engine D. Parallel Processing HardwareView AnswerAnswer: B
Which action results in the firewall blocking network traffic with out notifying the sender?
Which action results in the firewall blocking network traffic with out notifying the sender?A . Drop B. Deny C. Reset Server D. Reset ClientView AnswerAnswer: B
Place the following steps in the packet processing order of operations from first to last
DRAG DROP Place the following steps in the packet processing order of operations from first to last. View AnswerAnswer:
Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?
Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option? A . It defines the SSUTLS encryption strength used to protect the management interface. B. It defines the CA certificate used to verify the client's browser. C. It defines the certificate to send to the...
Which prevention technique will prevent attacks based on packet count?
Which prevention technique will prevent attacks based on packet count?A . zone protection profile B. URL filtering profile C. antivirus profile D. vulnerability profileView AnswerAnswer: A
Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?
Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?A . Active Directory monitoring B. Windows session monitoring C. Windows client probing D. domain controller monitoringView AnswerAnswer: A
Which object would an administrator create to block access to all high-risk applications?
Which object would an administrator create to block access to all high-risk applications?A . HIP profile B. application filter C. application group D. Vulnerability Protection profileView AnswerAnswer: B Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClKECA0
What is a function of application tags?
What is a function of application tags?A . creation of new zones B. application prioritization C. automated referenced applications in a policy D. IP address allocations in DHCPView AnswerAnswer: C
What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?
What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?A . every 30 minutes B. every 5 minutes C. once every 24 hours D. every 1 minuteView AnswerAnswer: D
Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?
Which security profile will provide the best protection against ICMP floods, based on individual combinations of a packet`s source and destination IP address?A . DoS protection B. URL filtering C. packet buffering D. anti-spywareView AnswerAnswer: A