Which prevention technique will prevent attacks based on packet count?

Which prevention technique will prevent attacks based on packet count?A . zone protection profileB . URL filtering profileC . antivirus profileD . vulnerability profileView AnswerAnswer: A

September 21, 2021 No Comments READ MORE +

Match the Cyber-Attack Lifecycle stage to its correct description

DRAG DROP Match the Cyber-Attack Lifecycle stage to its correct description. View AnswerAnswer: Explanation: Reconnaissance C stage where the attacker scans for network vulnerabilities and services that can be exploited. Installation C stage where the attacker will explore methods such as a root kit to establish persistence Command and Control...

September 20, 2021 No Comments READ MORE +

Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?

Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?A . Threat Prevention LicenseB . Threat Implementation LicenseC . Threat Environment LicenseD . Threat Protection LicenseView AnswerAnswer: A

September 20, 2021 No Comments READ MORE +

What is an advantage for using application tags?

What is an advantage for using application tags?A . They are helpful during the creation of new zonesB . They help with the design of IP address allocations in DHCD . They help content updates automate policy updatesE . They help with the creation of interfacesView AnswerAnswer: C

September 20, 2021 No Comments READ MORE +

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?

When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None? A . Translation TypeB . InterfaceC . Address TypeD . IP AddressView AnswerAnswer: A

September 19, 2021 No Comments READ MORE +

Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.

Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine. A . ExploitationB . InstallationC . ReconnaissanceD . Act on the ObjectiveView AnswerAnswer: A

September 19, 2021 No Comments READ MORE +

Which policy is required to enable source NAT on the firewall?

An internal host wants to connect to servers of the internet through using source NAT. Which policy is required to enable source NAT on the firewall?A . NAT policy with source zone and destination zone specifiedB . post-NAT policy with external source and any destination addressC . NAT policy with...

September 18, 2021 No Comments READ MORE +

How should you configure the firewall to allow access to any office-suite application?

You need to allow users to access the officeCsuite application of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre OfficeB . Create an Application Group and add business-systems to...

September 18, 2021 No Comments READ MORE +

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)

Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)A . User identificationB . Filtration protectionC . Vulnerability protectionD . AntivirusE . Application identificationF . Anti-spywareView AnswerAnswer: A,C,D,E,F

September 17, 2021 No Comments READ MORE +

Actions can be set for which two items in a URL filtering security profile? (Choose two.)

Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions

September 17, 2021 No Comments READ MORE +