What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...
Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?
Which license must an administrator acquire prior to downloading Antivirus updates for use with the firewall?A . URL filteringB . AntivirusC . WildFireD . Threat PreventionView AnswerAnswer: D
Which protocol used to map username to user groups when user-ID is configured?
Which protocol used to map username to user groups when user-ID is configured?A . SAMLB . RADIUSC . TACACS+D . LDAPView AnswerAnswer: D
Which statement is true regarding a Prevention Posture Assessment?
Which statement is true regarding a Prevention Posture Assessment?A . The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categoriesB . It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network...
Which the app-ID application will you need to allow in your security policy to use facebook-chat?
Which the app-ID application will you need to allow in your security policy to use facebook-chat?A . facebook-emailB . facebook-baseC . facebookD . facebook-chatView AnswerAnswer: B,D
Arrange the correct order that the URL classifications are processed within the system
DRAG DROP Arrange the correct order that the URL classifications are processed within the system. View AnswerAnswer: Explanation: First C Block List Second C Allow List Third C Custom URL Categories Fourth C External Dynamic Lists Fifth C Downloaded PAN-DB Files Sixth - PAN-DB Cloud
Complete the statement. A security profile can block or allow traffic____________
Complete the statement. A security profile can block or allow traffic____________A . on unknown-tcp or unknown-udp trafficB . after it is matched by a security policy that allows trafficC . before it is matched by a security policyD . after it is matched by a security policy that allows or...
Which type of address object is "10 5 1 1/0 127 248 2"?
Which type of address object is "10 5 1 1/0 127 248 2"?A . IP subnetB . IP wildcard maskC . IP netmaskD . IP rangeView AnswerAnswer: B
Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two.)
Which two firewall components enable you to configure SYN flood protection thresholds? (Choose two.)A . QoS profileB . DoS Protection profileC . Zone Protection profileD . DoS Protection policyView AnswerAnswer: B,C
The Palo Alto Networks NGFW was configured with a single virtual router named VR-1 What changes are required on VR-1 to route traffic between two interfaces on the NGFW?
The Palo Alto Networks NGFW was configured with a single virtual router named VR-1 What changes are required on VR-1 to route traffic between two interfaces on the NGFW?A . Add zones attached to interfaces to the virtual routerB . Add interfaces to the virtual routerC . Enable the redistribution...