What are three differences between security policies and security profiles? (Choose three.)
What are three differences between security policies and security profiles? (Choose three.)A . Security policies are attached to security profilesB . Security profiles are attached to security policiesC . Security profiles should only be used on allowed trafficD . Security profiles are used to block traffic by themselvesE . Security...
Based on the graphic which statement accurately describes the output shown in the server monitoring panel?
Based on the graphic which statement accurately describes the output shown in the server monitoring panel? A . The User-ID agent is connected to a domain controller labeled lab-client.B . The host lab-client has been found by the User-ID agent.C . The host lab-client has been found by a domain...
Which security profile feature could have been used to prevent the communication with the CnC server?
The CFO found a USB drive in the parking lot and decide to plug it into their corporate laptop. The USB drive had malware on it that loaded onto their computer and then contacted a known command and control (CnC) server, which ordered the infected machine to begin Exfiltrating data...
Which update option is not available to administrators?
Which update option is not available to administrators?A . New Spyware NotificationsB . New URLsC . New Application SignaturesD . New Malicious DomainsE . New Antivirus SignaturesView AnswerAnswer: B
Which option lists the attributes that are selectable when setting up an Application filters?
Which option lists the attributes that are selectable when setting up an Application filters?A . Category, Subcategory, Technology, and CharacteristicB . Category, Subcategory, Technology, Risk, and CharacteristicC . Name, Category, Technology, Risk, and CharacteristicD . Category, Subcategory, Risk, Standard Ports, and TechnologyView AnswerAnswer: B
Which action results in the firewall blocking network traffic with out notifying the sender?
Which action results in the firewall blocking network traffic with out notifying the sender?A . DropB . DenyC . Reset ServerD . Reset ClientView AnswerAnswer: B
Access to which feature requires the PAN-OS Filtering license?
Access to which feature requires the PAN-OS Filtering license?A . PAN-DB databaseB . DNS SecurityC . Custom URL categoriesD . URL external dynamic listsView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-licenses-andsubscriptions.html
Which dynamic update type includes updated anti-spyware signatures?
Which dynamic update type includes updated anti-spyware signatures?A . Applications and ThreatsB . GlobalProtect Data FileC . AntivirusD . PAN-DBView AnswerAnswer: A
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)
Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)A . Layer-IDB . User-IDC . QoS-IDD . App-IDView AnswerAnswer: B,D
Given the topology, which zone type should zone A and zone B to be configured with?
Given the topology, which zone type should zone A and zone B to be configured with? A . Layer3B . TapC . Layer2D . Virtual WireView AnswerAnswer: A