Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option?

Based on the graphic, what is the purpose of the SSL/TLS Service profile configuration option? A . It defines the SSUTLS encryption strength used to protect the management interface.B . It defines the CA certificate used to verify the client's browser.C . It defines the certificate to send to the...

March 2, 2022 No Comments READ MORE +

Access to which feature requires the PAN-OS Filtering license?

Access to which feature requires the PAN-OS Filtering license?A . PAN-DB databaseB . DNS SecurityC . Custom URL categoriesD . URL external dynamic listsView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-licenses-andsubscriptions.html

March 1, 2022 No Comments READ MORE +

When is the content inspection performed in the packet flow process?

When is the content inspection performed in the packet flow process?A . after the application has been identifiedB . after the SSL Proxy re-encrypts the packetC . before the packet forwarding processD . before session lookupView AnswerAnswer: A Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClVHCA0

March 1, 2022 No Comments READ MORE +

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?

Which two statements are true for the DNS security service introduced in PAN-OS version 10.0?A . It functions like PAN-DB and requires activation through the app portal.B . It removes the 100K limit for DNS entries for the downloaded DNS updates.C . IT eliminates the need for dynamic DNS updates.D...

March 1, 2022 No Comments READ MORE +

What is the main function of the Test Policy Match function?

What is the main function of the Test Policy Match function?A . verify that policy rules from Expedition are validB . confirm that rules meet or exceed the Best Practice Assessment recommendationsC . confirm that policy rules in the configuration are allowing/denying the correct trafficD . ensure that policy rules...

March 1, 2022 No Comments READ MORE +

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)

Which two Palo Alto Networks security management tools provide a consolidated creation of policies, centralized management and centralized threat intelligence. (Choose two.)A . GlobalProtectB . PanoramaC . ApertureD . AutoFocusView AnswerAnswer: B,D

February 28, 2022 No Comments READ MORE +

Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)

Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)A . Layer-IDB . User-IDC . QoS-IDD . App-IDView AnswerAnswer: B,D

February 28, 2022 No Comments READ MORE +

Which Palo Alto networks security operating platform service protects cloud-based application such as Dropbox and salesforce by monitoring permissions and shared and scanning files for Sensitive information?

Which Palo Alto networks security operating platform service protects cloud-based application such as Dropbox and salesforce by monitoring permissions and shared and scanning files for Sensitive information?A . Prisma SaaSB . AutoFocusC . PanoramaD . GlobalProtectView AnswerAnswer: A

February 28, 2022 No Comments READ MORE +

Which object would an administrator create to block access to all high-risk applications?

Which object would an administrator create to block access to all high-risk applications?A . HIP profileB . application filterC . application groupD . Vulnerability Protection profileView AnswerAnswer: B

February 28, 2022 No Comments READ MORE +

Application: _________?

All users from the internal zone must be allowed only Telnet access to a server in the DMZ zone. Complete the two empty fields in the Security Policy rules that permits only this type of access. Source Zone: Internal Destination Zone: DMZ Zone Application: _________? Service: ____________? Action: allow (Choose...

February 27, 2022 No Comments READ MORE +