Match the Palo Alto Networks Security Operating Platform architecture to its description

DRAG DROP Match the Palo Alto Networks Security Operating Platform architecture to its description. View AnswerAnswer: Explanation: Threat Intelligence Cloud C Gathers, analyzes, correlates, and disseminates threats to and from the network and endpoints located within the network. Next-Generation Firewall C Identifies and inspects all traffic to block known threats...

September 14, 2021 No Comments READ MORE +

Which interface does not require a MAC or IP address?

Which interface does not require a MAC or IP address?A . Virtual WireB . Layer3C . Layer2D . LoopbackView AnswerAnswer: A

September 14, 2021 No Comments READ MORE +

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A

September 13, 2021 No Comments READ MORE +

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?

To use Active Directory to authenticate administrators, which server profile is required in the authentication profile?A . domain controllerB . TACACS+C . LDAPD . RADIUSView AnswerAnswer: C

September 13, 2021 No Comments READ MORE +

Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.)

Given the scenario, which two statements are correct regarding multiple static default routes? (Choose two.) A . Path monitoring does not determine if route is useableB . Route with highest metric is actively usedC . Path monitoring determines if route is useableD . Route with lowest metric is actively usedView...

September 13, 2021 No Comments READ MORE +

Based on the security policy rules shown, ssh will be allowed on which port?

Based on the security policy rules shown, ssh will be allowed on which port? A . any portB . same port as ssl and snmpv3C . the default portD . only ephemeral portsView AnswerAnswer: C

September 13, 2021 No Comments READ MORE +

Which URL profiling action does not generate a log entry when a user attempts to access that URL?

Which URL profiling action does not generate a log entry when a user attempts to access that URL?A . OverrideB . AllowC . BlockD . ContinueView AnswerAnswer: B

March 27, 2021 No Comments READ MORE +

Based on the information, how is the SuperApp traffic affected after the 30 days have passed?

A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based...

March 26, 2021 No Comments READ MORE +

How do you reset the hit count on a security policy rule?

How do you reset the hit count on a security policy rule?A . First disable and then re-enable the rule.B . Reboot the data-plane.C . Select a Security policy rule, and then select Hit Count > Reset.D . Type the CLI command reset hitcount <POLICY-NAME>.View AnswerAnswer: C

March 26, 2021 No Comments READ MORE +

How is the hit count reset on a rule?

How is the hit count reset on a rule?A . select a security policy rule, right click Hit Count > ResetB . with a dataplane rebootC . Device > Setup > Logging and Reporting Settings > Reset Hit CountD . in the CLI, type command reset hitcount <POLICY-NAME>View AnswerAnswer: A

March 25, 2021 No Comments READ MORE +