Which two security profile types can be attached to a security policy? (Choose two.)
Which two security profile types can be attached to a security policy? (Choose two.)A . antivirusB . DDoS protectionC . threatD . vulnerabilityView AnswerAnswer: A,D
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine.
Given the Cyber-Attack Lifecycle diagram, identify the stage in which the attacker can initiate malicious code against a targeted machine. A . ExploitationB . InstallationC . ReconnaissanceD . Act on ObjectiveView AnswerAnswer: A
Which statement is true about Panorama managed devices?
Which statement is true about Panorama managed devices?A . Panorama automatically removes local configuration locks after a commit from PanoramaB . Local configuration locks prohibit Security policy changes for a Panorama managed deviceC . Security policy rules configured on local firewalls always take precedenceD . Local configuration locks can be...
Based on the screenshot what is the purpose of the group in User labelled ''it"?
Based on the screenshot what is the purpose of the group in User labelled ''it"? A . Allows users to access IT applications on all portsB . Allows users in group "DMZ" lo access IT applicationsC . Allows "any" users to access servers in the DMZ zoneD . Allows users...
Which type of address object is "10 5 1 1/0 127 248 2"?
Which type of address object is "10 5 1 1/0 127 248 2"?A . IP subnetB . IP wildcard maskC . IP netmaskD . IP rangeView AnswerAnswer: B
Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP Cto-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures.
Your company requires positive username attribution of every IP address used by wireless devices to support a new compliance requirement. You must collect IP Cto-user mappings as soon as possible with minimal downtime and minimal configuration changes to the wireless devices themselves. The wireless devices are from various manufactures. Given...
Order the steps needed to create a new security zone with a Palo Alto Networks firewall
DRAG DROP Order the steps needed to create a new security zone with a Palo Alto Networks firewall. View AnswerAnswer: Explanation: Step 1 C Select network tab Step 2 C Select zones from the list of available items Step 3 C Select Add Step 4 C Specify Zone Name Step...
Which policy achieves the desired results?
Given the network diagram, traffic should be permitted for both Trusted and Guest users to access general Internet and DMZ servers using SSH. web-browsing and SSL applications Which policy achieves the desired results? A) B) C) D) A . OptionB . OptionC . OptionD . OptionView AnswerAnswer: C
Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)
Which two features can be used to tag a user name so that it is included in a dynamic user group? (Choose two)A . XML APIB . log forwarding auto-taggingC . GlobalProtect agentD . User-ID Windows-based agentView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions
Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?
Which action related to App-ID updates will enable a security administrator to view the existing security policy rule that matches new application signatures?A . Review PoliciesB . Review AppsC . Pre-analyzeD . Review App MatchesView AnswerAnswer: A