In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?
In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?
Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?A . ManagementB . High AvailabilityC . AggregateD . AggregationView AnswerAnswer: C
Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)
Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)A . GlobalProtectB . PanoramaC . ApertureD . AutoFocusView AnswerAnswer: B,D
Which statement is true regarding a Best Practice Assessment?
Which statement is true regarding a Best Practice Assessment?A . The BPA tool can be run only on firewallsB . It provides a percentage of adoption for each assessment dataC . The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus...
What must be configured for the firewall to access multiple authentication profiles for external services to authenticate a non-local account?
What must be configured for the firewall to access multiple authentication profiles for external services to authenticate a non-local account?A . authentication sequenceB . LDAP server profileC . authentication server listD . authentication list profileView AnswerAnswer: A
Which prevention technique will prevent attacks based on packet count?
Which prevention technique will prevent attacks based on packet count?A . zone protection profileB . URL filtering profileC . antivirus profileD . vulnerability profileView AnswerAnswer: A
How is the hit count reset on a rule?
How is the hit count reset on a rule?A . select a security policy rule, right click Hit Count > ResetB . with a dataplane rebootC . Device > Setup > Logging and Reporting Settings > Reset Hit CountD . in the CLI, type command reset hitcount <POLICY-NAME>View AnswerAnswer: A
Given the topology, which zone type should interface E1/1 be configured with?
Given the topology, which zone type should interface E1/1 be configured with? A . TapB . TunnelC . Virtual WireD . Layer3View AnswerAnswer: A
Which security profile feature could have been used to prevent the communication with the CnC server?
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data...
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?A . GlobalProtectB . AutoFocusC . ApertureD . PanoramaView AnswerAnswer: A