What are three differences between security policies and security profiles? (Choose three.)

What are three differences between security policies and security profiles? (Choose three.)A . Security policies are attached to security profilesB . Security profiles are attached to security policiesC . Security profiles should only be used on allowed trafficD . Security profiles are used to block traffic by themselvesE . Security...

September 17, 2021 No Comments READ MORE +

Based on the graphic which statement accurately describes the output shown in the server monitoring panel?

Based on the graphic which statement accurately describes the output shown in the server monitoring panel? A . The User-ID agent is connected to a domain controller labeled lab-client.B . The host lab-client has been found by the User-ID agent.C . The host lab-client has been found by a domain...

September 16, 2021 No Comments READ MORE +

Which security profile feature could have been used to prevent the communication with the CnC server?

The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data...

September 16, 2021 No Comments READ MORE +

Which update option is not available to administrators?

Which update option is not available to administrators?A . New Spyware NotificationsB . New URLsC . New Application SignaturesD . New Malicious DomainsE . New Antivirus SignaturesView AnswerAnswer: B

September 16, 2021 No Comments READ MORE +

Which option lists the attributes that are selectable when setting up an Application filters?

Which option lists the attributes that are selectable when setting up an Application filters?A . Category, Subcategory, Technology, and CharacteristicB . Category, Subcategory, Technology, Risk, and CharacteristicC . Name, Category, Technology, Risk, and CharacteristicD . Category, Subcategory, Risk, Standard Ports, and TechnologyView AnswerAnswer: B

September 15, 2021 No Comments READ MORE +

Which action results in the firewall blocking network traffic with out notifying the sender?

Which action results in the firewall blocking network traffic with out notifying the sender?A . DropB . DenyC . Reset ServerD . Reset ClientView AnswerAnswer: B

September 15, 2021 No Comments READ MORE +

Access to which feature requires the PAN-OS Filtering license?

Access to which feature requires the PAN-OS Filtering license?A . PAN-DB databaseB . DNS SecurityC . Custom URL categoriesD . URL external dynamic listsView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-licenses-andsubscriptions.html

September 15, 2021 No Comments READ MORE +

Which dynamic update type includes updated anti-spyware signatures?

Which dynamic update type includes updated anti-spyware signatures?A . Applications and ThreatsB . GlobalProtect Data FileC . AntivirusD . PAN-DBView AnswerAnswer: A

September 15, 2021 No Comments READ MORE +

Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)

Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)A . Layer-IDB . User-IDC . QoS-IDD . App-IDView AnswerAnswer: B,D

September 15, 2021 No Comments READ MORE +

Given the topology, which zone type should zone A and zone B to be configured with?

Given the topology, which zone type should zone A and zone B to be configured with? A . Layer3B . TapC . Layer2D . Virtual WireView AnswerAnswer: A

September 15, 2021 No Comments READ MORE +