Which statements is true regarding a Heatmap report?

Which statements is true regarding a Heatmap report?A . When guided by authorized sales engineer, it helps determine te areas of greatest security risk.B . It provides a percentage of adoption for each assessment area.C . It runs only on firewall.D . It provides a set of questionnaires that help...

February 27, 2022 No Comments READ MORE +

Actions can be set for which two items in a URL filtering security profile? (Choose two.)

Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions

February 27, 2022 No Comments READ MORE +

What is a recommended consideration when deploying content updates to the firewall from Panorama?

What is a recommended consideration when deploying content updates to the firewall from Panorama?A . Before deploying content updates, always check content release version compatibility.B . Content updates for firewall A/P HA pairs can only be pushed to the active firewall.C . Content updates for firewall A/A HA pairs need...

February 27, 2022 No Comments READ MORE +

At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?

At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?A . after clicking Check New in the Dynamic Update windowB . after connecting the firewall configurationC . after downloading the updateD . after installing the updateView AnswerAnswer: C...

February 27, 2022 No Comments READ MORE +

Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?

Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?A . URL trafficB . vulnerability protectionC . anti-spywareD . antivirusView AnswerAnswer: C

February 26, 2022 No Comments READ MORE +

Which option is part of the content inspection process?

Which option is part of the content inspection process?A . IPsec tunnel encryptionB . Packet egress processC . SSL Proxy re-encryptD . Packet forwarding processView AnswerAnswer: C

February 25, 2022 No Comments READ MORE +

Which operations are allowed when working with App-ID application tags?

Which operations are allowed when working with App-ID application tags?A . Predefined tags may be deleted.B . Predefined tags may be augmented by custom tags.C . Predefined tags may be modified.D . Predefined tags may be updated by WildFire dynamic updates.View AnswerAnswer: B

February 25, 2022 No Comments READ MORE +

Based on the security policy rules shown, ssh will be allowed on which port?

Based on the security policy rules shown, ssh will be allowed on which port? A . 80B . 53C . 22D . 23View AnswerAnswer: C

February 25, 2022 No Comments READ MORE +

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?

Which Palo Alto Networks firewall security platform provides network security for mobile endpoints by inspecting traffic deployed as internet gateways?A . GlobalProtectB . AutoFocusC . ApertureD . PanoramaView AnswerAnswer: A

February 25, 2022 No Comments READ MORE +

What is the correct process to enable this logging1?

An administrator would like to see the traffic that matches the interzone-default rule in the traffic logs. What is the correct process to enable this logging1?A . Select the interzone-default rule and edit the rule on the Actions tab select Log at Session Start and click OKB . Select the...

February 24, 2022 No Comments READ MORE +