Which license is required to use the Palo Alto Networks built-in IP address EDLs?

Which license is required to use the Palo Alto Networks built-in IP address EDLs?A . DNS Security B. Threat Prevention C. WildFire D. SD-WanView AnswerAnswer: B Explanation: An active Threat Prevention license is required to obtain Palo Alto Networks built-in EDLs. These built-in EDLs protect your network against malicious hosts.

July 17, 2023 No Comments READ MORE +

Which action would yield the information?

An administrator would like to determine the default deny action for the application dns-over- https. Which action would yield the information?A . View the application details in beacon paloaltonetworks.com B. Check the action for the Security policy matching that traffic C. Check the action for the decoder in the antivirus...

July 17, 2023 No Comments READ MORE +

What is the function of an application group object?

What is the function of an application group object? A. It contains applications that you want to treat similarly in policy B. It groups applications dynamically based on application attributes that you define C. It represents specific ports and protocols for an application A. D. It identifies the purpose of...

July 16, 2023 No Comments READ MORE +

What is the correct configuration for the new EMEA Regional Panorama Administrator profile?

The NetSec Manager asked to create a new EMEA Regional Panorama Administrator profile with customized privileges. In particular, the new EMEA Regional Panorama Administrator should be able to: - Access only EMEA-Regional device groups with read-only privileges - Access only EMEA-Regional templates with read-only privileges What is the correct configuration...

July 16, 2023 No Comments READ MORE +

Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?

Which interface type is used to monitor traffic and cannot be used to perform traffic shaping?A . Layer 2 B. Tap C. Layer 3 D. Virtual WireView AnswerAnswer: B

July 16, 2023 No Comments READ MORE +

What are two differences between an application group and an application filter? (Choose two.)

What are two differences between an application group and an application filter? (Choose two.)A . Application groups enable access to sanctioned applications explicitly, while application filters enable access to sanctioned applications implicitly. B. Application groups are static, while application filters are dynamic. C. Application groups dynamically group applications based on...

July 16, 2023 No Comments READ MORE +

What is a function of application tags?

What is a function of application tags?A . creation of new zones B. application prioritization C. automated referenced applications in a policy D. IP address allocations in DHCPView AnswerAnswer: C

July 16, 2023 No Comments READ MORE +

Which Security profile can be used to detect and block compromised hosts from trying to communicate with external command-and-control (C2) servers?

Which Security profile can be used to detect and block compromised hosts from trying to communicate with external command-and-control (C2) servers?A . URL Filtering B. Antivirus C. Vulnerability D. Anti-SpywareView AnswerAnswer: D

July 16, 2023 No Comments READ MORE +

Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?

Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?A . Management B. High Availability C. Aggregate D. AggregationView AnswerAnswer: C Explanation: Only AGGREGATE interface can belong to a zone.

July 16, 2023 No Comments READ MORE +

Which statement is correct about the information displayed?

An administrator is reviewing the Security policy rules shown in the screenshot below. Which statement is correct about the information displayed?A . Eleven rules use the "Infrastructure* tag. B. The view Rulebase as Groups is checked. C. There are seven Security policy rules on this firewall. D. Highlight Unused Rules...

July 15, 2023 No Comments READ MORE +