Which interface does not require a MAC or IP address?

Which interface does not require a MAC or IP address?A . Virtual Wire B. Layer3 C. Layer2 D. LoopbackView AnswerAnswer: A

September 9, 2022 No Comments READ MORE +

Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request?

untrust to the internet Based on the capabilities of the Palo Alto Networks NGFW, what are two ways to configure a security policy using App-ID to comply with this request? (Choose two)A . Create a deny rule at the top of the policy from trust to untrust over any service...

September 9, 2022 No Comments READ MORE +

What are two security policy actions the administrator can select?

An administrator would like to block access to a web server, while also preserving resources and minimizing half-open sockets . What are two security policy actions the administrator can select? (Choose two.)A . Reset server B. Reset both C. Drop D. DenyView AnswerAnswer: A,C

September 9, 2022 No Comments READ MORE +

Which administrator type utilizes predefined roles for a local administrator account?

Which administrator type utilizes predefined roles for a local administrator account?A . Superuser B. Role-based C. Dynamic D. Device administratorView AnswerAnswer: C Explanation: References:

September 9, 2022 No Comments READ MORE +

What is the correct process tor creating a custom URL category?

What is the correct process tor creating a custom URL category?A . Objects > Security Profiles > URL Category > Add B. Objects > Custom Objects > URL Filtering > Add C. Objects > Security Profiles > URL Filtering > Add D. Objects > Custom Objects > URL Category >...

September 9, 2022 No Comments READ MORE +

Given the detailed log information above, what was the result of the firewall traffic inspection?

Given the detailed log information above, what was the result of the firewall traffic inspection? A . It was blocked by the Vulnerability Protection profile action. B. It was blocked by the Anti-Virus Security profile action. C. It was blocked by the Anti-Spyware Profile action. D. It was blocked by...

September 9, 2022 No Comments READ MORE +

Given the image, which two options are true about the Security policy rules. (Choose two.)

Given the image, which two options are true about the Security policy rules. (Choose two.) A . The Allow Office Programs rule is using an Application Filter B. In the Allow FTP to web server rule, FTP is allowed using App-ID C. The Allow Office Programs rule is using an...

September 9, 2022 No Comments READ MORE +

Access to which feature requires the PAN-OS Filtering license?

Access to which feature requires the PAN-OS Filtering license?A . PAN-DB database B. DNS Security C. Custom URL categories D. URL external dynamic listsView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-licenses-andsubscriptions.html

September 8, 2022 No Comments READ MORE +

What can be achieved by selecting a policy target prior to pushing policy rules from Panorama?

What can be achieved by selecting a policy target prior to pushing policy rules from Panorama?A . Doing so limits the templates that receive the policy rules B. Doing so provides audit information prior to making changes for selected policy rules C. You can specify the firewalls m a device...

September 8, 2022 No Comments READ MORE +

Which statement best describes the use of Policy Optimizer?

Which statement best describes the use of Policy Optimizer?A . Policy Optimizer can display which Security policies have not been used in the last 90 days B. Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have unused applications C. Policy Optimizer can add or...

September 8, 2022 No Comments READ MORE +