Which prevention technique will prevent attacks based on packet count?
Which prevention technique will prevent attacks based on packet count?A . zone protection profileB . URL filtering profileC . antivirus profileD . vulnerability profileView AnswerAnswer: A
Match the Cyber-Attack Lifecycle stage to its correct description
DRAG DROP Match the Cyber-Attack Lifecycle stage to its correct description. View AnswerAnswer: Explanation: Reconnaissance C stage where the attacker scans for network vulnerabilities and services that can be exploited. Installation C stage where the attacker will explore methods such as a root kit to establish persistence Command and Control...
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?A . Threat Prevention LicenseB . Threat Implementation LicenseC . Threat Environment LicenseD . Threat Protection LicenseView AnswerAnswer: A
What is an advantage for using application tags?
What is an advantage for using application tags?A . They are helpful during the creation of new zonesB . They help with the design of IP address allocations in DHCD . They help content updates automate policy updatesE . They help with the creation of interfacesView AnswerAnswer: C
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None?
When creating a Source NAT policy, which entry in the Translated Packet tab will display the options Dynamic IP and Port, Dynamic, Static IP, and None? A . Translation TypeB . InterfaceC . Address TypeD . IP AddressView AnswerAnswer: A
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine.
Given the cyber-attack lifecycle diagram identify the stage in which the attacker can run malicious code against a vulnerability in a targeted machine. A . ExploitationB . InstallationC . ReconnaissanceD . Act on the ObjectiveView AnswerAnswer: A
Which policy is required to enable source NAT on the firewall?
An internal host wants to connect to servers of the internet through using source NAT. Which policy is required to enable source NAT on the firewall?A . NAT policy with source zone and destination zone specifiedB . post-NAT policy with external source and any destination addressC . NAT policy with...
How should you configure the firewall to allow access to any office-suite application?
You need to allow users to access the officeCsuite application of their choice. How should you configure the firewall to allow access to any office-suite application?A . Create an Application Group and add Office 365, Evernote Google Docs and Libre OfficeB . Create an Application Group and add business-systems to...
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)A . User identificationB . Filtration protectionC . Vulnerability protectionD . AntivirusE . Application identificationF . Anti-spywareView AnswerAnswer: A,C,D,E,F
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions