Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?

Which Palo Alto network security operating platform component provides consolidated policy creation and centralized management?A . Prisma SaaSB . PanoramaC . AutoFocusD . GlobalProtectView AnswerAnswer: B

September 26, 2021 No Comments READ MORE +

Given the image, which two options are true about the Security policy rules. (Choose two.)

Given the image, which two options are true about the Security policy rules. (Choose two.) A . The Allow Office Programs rule is using an Application FilterB . In the Allow FTP to web server rule, FTP is allowed using App-IDC . The Allow Office Programs rule is using an...

September 26, 2021 No Comments READ MORE +

Which utility should the company use to identify out-of-date or unused rules on the firewall?

A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?A . Rule Usage Filter > No App SpecifiedB . Rule Usage Filter >Hit Count > Unused in 30...

September 26, 2021 No Comments READ MORE +

How often does WildFire release dynamic updates?

How often does WildFire release dynamic updates?A . every 5 minutesB . every 15 minutesC . every 60 minutesD . every 30 minutesView AnswerAnswer: A

September 26, 2021 No Comments READ MORE +

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?A . Active Directory monitoringB . Windows session monitoringC . Windows client probingD . domain controller monitoringView AnswerAnswer: A

September 25, 2021 No Comments READ MORE +

What is the main function of the Test Policy Match function?

What is the main function of the Test Policy Match function?A . verify that policy rules from Expedition are validB . confirm that rules meet or exceed the Best Practice Assessment recommendationsC . confirm that policy rules in the configuration are allowing/denying the correct trafficD . ensure that policy rules...

September 25, 2021 No Comments READ MORE +

Which log setting is correct?

An administrator wishes to follow best practices for logging traffic that traverses the firewall Which log setting is correct?A . Disable all loggingB . Enable Log at Session EndC . Enable Log at Session StartD . Enable Log at both Session Start and EndView AnswerAnswer: B

September 25, 2021 No Comments READ MORE +

Which Security profile should be applied?

An administrator wants to prevent users from submitting corporate credentials in a phishing attack. Which Security profile should be applied?A . antivirusB . anti-spywareC . URL filteringD . vulnerability protectionView AnswerAnswer: B

September 25, 2021 No Comments READ MORE +

Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?

Which type of security rule will match traffic between the Inside zone and Outside zone, within the Inside zone, and within the Outside zone?A . globalB . intrazoneC . interzoneD . universalView AnswerAnswer: D Explanation: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClomCAC

September 25, 2021 No Comments READ MORE +

Based on the information, how is the SuperApp traffic affected after the 30 days have passed?

A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based...

September 25, 2021 No Comments READ MORE +