Which security policy is blocking the YouTube application?
Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application?A . intrazone-defaultB . Deny GoogleC . allowed-security servicesD . interzone-defaultView AnswerAnswer: D
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?A . Windows session monitoring via a domain controllerB . passive server monitoring using the Windows-based agentC . Captive PortalD . passive server monitoring using a PAN-OS integrated User-ID agentView AnswerAnswer:...
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email?
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email? A . DeliveryB . ReconnaissanceC . Command and ControlD . ExploitationView AnswerAnswer: D
Which plane on a Palo Alto Networks Firewall provides configuration, logging, and reporting functions on a separate processor?
Which plane on a Palo Alto Networks Firewall provides configuration, logging, and reporting functions on a separate processor?A . managementB . network processingC . dataD . security processingView AnswerAnswer: A
Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)
Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)A . facebookB . facebook-chatC . facebook-baseD . facebook-emailView AnswerAnswer: BC Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClV0CAK
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email?
At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email? A . DeliveryB . ReconnaissanceC . Command and ControlD . ExploitationView AnswerAnswer: D
Match the Palo Alto Networks Security Operating Platform architecture to its description
DRAG DROP Match the Palo Alto Networks Security Operating Platform architecture to its description. View AnswerAnswer:
Match the Cyber-Attack Lifecycle stage to its correct description
DRAG DROP Match the Cyber-Attack Lifecycle stage to its correct description. View AnswerAnswer:
Order the steps needed to create a new security zone with a Palo Alto Networks firewall
DRAG DROP Order the steps needed to create a new security zone with a Palo Alto Networks firewall. View AnswerAnswer: