Which type of address object is "10 5 1 1/0 127 248 2"?
Which type of address object is "10 5 1 1/0 127 248 2"?A . IP subnet B. IP wildcard mask C. IP netmask D. IP rangeView AnswerAnswer: B
What allows a security administrator to preview the Security policy rules that match new application signatures?
What allows a security administrator to preview the Security policy rules that match new application signatures?A . Review Release Notes B. Dynamic Updates-Review Policies C. Dynamic Updates-Review App D. Policy Optimizer-New App ViewerView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/app-id/manage-new-app-ids-introduced-in-content-releases/review-new-app-id-impact-on-existing-policy-rules
Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?
Which type of security policy rule will match traffic that flows between the Outside zone and inside zone, but would not match traffic that flows within the zones?A . global B. intrazone C. interzone D. universalView AnswerAnswer: C Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/9-0/pan-os-admin/software-and-content-updates/dynamic-contentupdates.html#:~:text=WildFire%20signature%20updates%20are%20made,within%20a%20minute%20of %20availability
Which Security policy action should the administrator select?
An administrator would like to silently drop traffic from the internet to a ftp server. Which Security policy action should the administrator select?A . Reset-server B. Block C. Deny D. DropView AnswerAnswer: D
What are the two default behaviors for the intrazone-default policy? (Choose two.)
What are the two default behaviors for the intrazone-default policy? (Choose two.)A . Allow B. Logging disabled C. Log at Session End D. DenyView AnswerAnswer: A,B
Which plane on a Palo alto networks firewall provides configuration logging and reporting functions on a separate processor?
Which plane on a Palo alto networks firewall provides configuration logging and reporting functions on a separate processor?A . data B. network processing C. management D. security processingView AnswerAnswer: C
If a virus gets detected, how wilt the firewall handle the traffic?
An administrator configured a Security policy rule with an Antivirus Security profile. The administrator did not change the action (or the profile. If a virus gets detected, how wilt the firewall handle the traffic?A . It allows the traffic because the profile was not set to explicitly deny the traffic....
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . Weaponization B. Reconnaissance C. Installation D. Command and Control E. ExploitationView AnswerAnswer: A
Which security policy action causes this?
An administrator would like to use App-ID's deny action for an application and would like that action updated with dynamic updates as new content becomes available. Which security policy action causes this?A . Reset server B. Reset both C. Deny D. DropView AnswerAnswer: C Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/manage- configuration backups/revert-firewall-configuration- changes.html
Which log setting configuration is consistent with best practices tor normal traffic?
An administrator is reviewing another administrator s Security policy log settings Which log setting configuration is consistent with best practices tor normal traffic?A . Log at Session Start and Log at Session End both enabled B. Log at Session Start disabled Log at Session End enabled C. Log at Session...