Which statements is true regarding a Heatmap report?
Which statements is true regarding a Heatmap report?A . When guided by authorized sales engineer, it helps determine te areas of greatest security risk.B . It provides a percentage of adoption for each assessment area.C . It runs only on firewall.D . It provides a set of questionnaires that help...
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions
What is a recommended consideration when deploying content updates to the firewall from Panorama?
What is a recommended consideration when deploying content updates to the firewall from Panorama?A . Before deploying content updates, always check content release version compatibility.B . Content updates for firewall A/P HA pairs can only be pushed to the active firewall.C . Content updates for firewall A/A HA pairs need...
At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?
At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?A . after clicking Check New in the Dynamic Update windowB . after connecting the firewall configurationC . after downloading the updateD . after installing the updateView AnswerAnswer: C...
Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?
Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?A . URL trafficB . vulnerability protectionC . anti-spywareD . antivirusView AnswerAnswer: C
Which option is part of the content inspection process?
Which option is part of the content inspection process?A . IPsec tunnel encryptionB . Packet egress processC . SSL Proxy re-encryptD . Packet forwarding processView AnswerAnswer: C
Which operations are allowed when working with App-ID application tags?
Which operations are allowed when working with App-ID application tags?A . Predefined tags may be deleted.B . Predefined tags may be augmented by custom tags.C . Predefined tags may be modified.D . Predefined tags may be updated by WildFire dynamic updates.View AnswerAnswer: B
Based on the security policy rules shown, ssh will be allowed on which port?
Based on the security policy rules shown, ssh will be allowed on which port? A . 80B . 53C . 22D . 23View AnswerAnswer: C
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?
Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?A . GlobalProtectB . AutoFocusC . ApertureD . PanoramaView AnswerAnswer: A
What is the correct process to enable this logging1?
An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs. What is the correct process to enable this logging1?A . Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start and click OKB . Select the...