Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?
Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?A . Windows-based agent deployed on the internal network B. PAN-OS integrated agent deployed on the internal network C. Citrix terminal server deployed on the internal network D. Windows-based...
What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?
Prior to a maintenance-window activity, the administrator would like to make a backup of only the running configuration to an external location. What command in Device > Setup > Operations would provide the most operationally efficient way to achieve this outcome?A . save named configuration snapshot B. export device state...
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)
Starting with PAN-OS version 9.1, application dependency information is now reported in which two locations? (Choose two.)A . on the App Dependency tab in the Commit Statuswindow B. on the Policy Optimizer'sRule Usagepage C ontheApplication tab in the Security Policy Rulecreation window C. ontheObjects>Applicationsbrowser pagesView AnswerAnswer: A,C Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/app-id/use-application-objects-in-policy/resolve-application-dependencies.html
Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?
Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?A . It functions like PAN-DB and requires activation through the app portal. B. It removes the 100K limit for DNS entries for the downloaded DNS updates. C. IT eliminates the need for dynamic DNS updates....
Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?
You receive notification about new malware that infects hosts through malicious files transferred by FTP. Which Security profile detects and protects your internal networks from this threat after you update your firewall’s threat signature database?A . URL Filtering profile applied to inbound Security policy rules. B. Data Filtering profile applied...
How should you configure the firewall to allow access to any office-suite application?
You need to allow users to access the officeCsuite application of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre Office B. Create an Application Group and add business-systems to...
Selecting the option to revert firewall changes will replace what settings?
Selecting the option to revert firewall changes will replace what settings?A . The running configuration with settings from the candidate configuration B. The candidate configuration with settings from the running configuration C. The device state with settings from another configuration D. Dynamic update scheduler settingsView AnswerAnswer: A
Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)
Which three statement describe the operation of Security Policy rules or Security Profiles? (Choose three)A . Security policy rules inspect but do not block traffic. B. Security Profile should be used only on allowed traffic. C. Security Profile are attached to security policy rules. D. Security Policy rules are attached...
Which tab would an administrator click to create an address object?
Which tab would an administrator click to create an address object?A . Device B. Policies C. Monitor D. ObjectsView AnswerAnswer: D
Based on the screenshot presented which column contains the link that when clicked opens a window to display all applications matched to the policy rule?
Based on the screenshot presented which column contains the link that when clicked opens a window to display all applications matched to the policy rule? A . Apps Allowed B. Name C. Apps Seen D. ServiceView AnswerAnswer: C