Which firewall plane provides configuration, logging, and reporting functions on a separate processor?
Which firewall plane provides configuration, logging, and reporting functions on a separate processor?A . controlB . network processingC . dataD . security processingView AnswerAnswer: A
Given the screenshot, what are two correct statements about the logged traffic? (Choose two.)
Given the screenshot, what are two correct statements about the logged traffic? (Choose two.) A . The web session was unsuccessfully decrypted.B . The traffic was denied by security profile.C . The traffic was denied by URL filtering.D . The web session was decrypted.View AnswerAnswer: C,D
At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email?
At which stage of the cyber-attack lifecycle would the attacker attach an infected PDF file to an email? A . deliveryB . command and controlC . explotationD . reinsuranceE . installationView AnswerAnswer: A
Which user-ID agent sufficient in your network?
Your company occupies one floor in a single building you have two active directory domain controllers on a single networks the firewall s management plane is only slightly utilized. Which user-ID agent sufficient in your network?A . PAN-OS integrated agent deployed on the firewallB . Windows-based agent deployed on the...
Which log setting configuration is consistent with best practices tor normal traffic?
An administrator is reviewing another administrator s Security policy log settings Which log setting configuration is consistent with best practices tor normal traffic?A . Log at Session Start and Log at Session End both enabledB . Log at Session Start disabled Log at Session End enabledC . Log at Session...
Which two security profile types can be attached to a security policy? (Choose two.)
Which two security profile types can be attached to a security policy? (Choose two.)A . antivirusB . DDoS protectionC . threatD . vulnerabilityView AnswerAnswer: A,D
Which file is used to save the running configuration with a Palo Alto Networks firewall?
Which file is used to save the running configuration with a Palo Alto Networks firewall?A . running-config.xmlB . run-config.xmlC . running-configuration.xmlD . run-configuratin.xmlView AnswerAnswer: A
Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)
Which two App-ID applications will need to be allowed to use Facebook-chat? (Choose two.)A . facebookB . facebook-chatC . facebook-baseD . facebook-emailView AnswerAnswer: B,C
Match the cyber-attack lifecycle stage to its correct description
DRAG DROP Match the cyber-attack lifecycle stage to its correct description. View AnswerAnswer:
Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?
Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?A . overrideB . authorizationC . authenticationD . continueView AnswerAnswer: A