Which firewall plane provides configuration, logging, and reporting functions on a separate processor?

Which firewall plane provides configuration, logging, and reporting functions on a separate processor?A . controlB . network processingC . dataD . security processingView AnswerAnswer: A

February 18, 2022 No Comments READ MORE +

Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)

Given the screenshot, what are two correct statements about the logged traffic? (Choose two.) A . The web session was unsuccessfully decrypted.B . The traffic was denied by security profile.C . The traffic was denied by URL filtering.D . The web session was decrypted.View AnswerAnswer: C,D

February 18, 2022 No Comments READ MORE +

At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email?

At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email? A . deliveryB . command and controlC . explotationD . reinsuranceE . installationView AnswerAnswer: A

February 17, 2022 No Comments READ MORE +

Which user-ID agent sufficient in your network?

Your company occupies one floor in a single building you have two active directory domain controllers on a single networks the firewall s management plane is only slightly utilized. Which user-ID agent sufficient in your network?A . PAN-OS integrated agent deployed on the firewallB . Windows-based agent deployed on the...

February 17, 2022 No Comments READ MORE +

Which log setting configuration is consistent with best practices tor normal traffic?

An administrator is reviewing another administrator s Security policy log settings Which log setting configuration is consistent with best practices tor normal traffic?A . Log at Session Start and Log at Session End both enabledB . Log at Session Start disabled Log at Session End enabledC . Log at Session...

February 17, 2022 No Comments READ MORE +

Which two security profile types can be attached to a security policy? (Choose two.)

Which two security profile types can be attached to a security policy? (Choose two.)A . antivirusB . DDoS protectionC . threatD . vulnerabilityView AnswerAnswer: A,D

February 17, 2022 No Comments READ MORE +

Which file is used to save the running configuration with a Palo Alto Networks firewall?

Which file is used to save the running configuration with a Palo Alto Networks firewall?A . running-config.xmlB . run-config.xmlC . running-configuration.xmlD . run-configuratin.xmlView AnswerAnswer: A

September 28, 2021 No Comments READ MORE +

Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)

Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)A . facebookB . facebook-chatC . facebook-baseD . facebook-emailView AnswerAnswer: B,C

September 27, 2021 No Comments READ MORE +

Match the cyber-attack lifecycle stage to its correct description

DRAG DROP Match the cyber-attack lifecycle stage to its correct description. View AnswerAnswer:

September 27, 2021 No Comments READ MORE +

Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?

Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?A . overrideB . authorizationC . authenticationD . continueView AnswerAnswer: A

September 27, 2021 No Comments READ MORE +