Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?

Which security policy rule would be needed to match traffic that passes between the Outside zone and Inside zone, but does not match traffic that passes within the zones?A . intrazoneB . interzoneC . universalD . globalView AnswerAnswer: B

June 21, 2022 No Comments READ MORE +

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?A . domain controllerB . TACACS+C . LDAPD . RADIUSView AnswerAnswer: C

June 21, 2022 No Comments READ MORE +

Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?

A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?A . Windows-based agent on a domain controllerB . Captive PortalC . Citrix terminal...

June 21, 2022 No Comments READ MORE +

Which the app-ID application will you need to allow in your security policy to use facebook-chat?

Which the app-ID application will you need to allow in your security policy to use facebook-chat?A . facebook-emailB . facebook-baseC . facebookD . facebook-chatView AnswerAnswer: B, D

June 20, 2022 No Comments READ MORE +

Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?

Which administrator receives a global notification for a new malware that infects hosts. The infection will result in the infected host attempting to contact and command-and-control (C2) server. Which security profile components will detect and prevent this threat after the firewall`s signature database has been updated?A . antivirus profile applied...

June 20, 2022 No Comments READ MORE +

Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?

Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?A . Windows session monitoring via a domain controllerB . passive server monitoring using the Windows-based agentC . Captive PortalD . passive server monitoring using a PAN-OS integrated User-ID agentView AnswerAnswer:...

June 20, 2022 No Comments READ MORE +

Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?

An administrator notices that protection is needed for traffic within the network due to malicious lateral movement activity. Based on the image shown, which traffic would the administrator need to monitor and block to mitigate the malicious activity?A . branch office trafficB . north-south trafficC . perimeter trafficD . east-west...

June 20, 2022 No Comments READ MORE +

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.

Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine. A . ExploitationB . InstallationC . ReconnaissanceD . Act on ObjectiveView AnswerAnswer: A

June 19, 2022 No Comments READ MORE +

Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall?

Which data-plane processor layer of the graphic shown provides uniform matching for spyware and vulnerability exploits on a Palo Alto Networks Firewall? A . Signature MatchingB . Network ProcessingC . Security ProcessingD . Security MatchingView AnswerAnswer: A

June 19, 2022 No Comments READ MORE +

How often does WildFire release dynamic updates?

How often does WildFire release dynamic updates?A . every 5 minutesB . every 15 minutesC . every 60 minutesD . every 30 minutesView AnswerAnswer: A

June 19, 2022 No Comments READ MORE +