Which security policy is blocking the YouTube application?

Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application?A . intrazone-defaultB . Deny GoogleC . allowed-security servicesD . interzone-defaultView AnswerAnswer: D

January 23, 2021 No Comments READ MORE +

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)

What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...

January 23, 2021 No Comments READ MORE +

Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?

Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?A . Windows session monitoring via a domain controllerB . passive server monitoring using the Windows-based agentC . Captive PortalD . passive server monitoring using a PAN-OS integrated User-ID agentView AnswerAnswer:...

January 22, 2021 No Comments READ MORE +

At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email?

At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email? A . DeliveryB . ReconnaissanceC . Command and ControlD . ExploitationView AnswerAnswer: D

January 22, 2021 No Comments READ MORE +

Which plane on a Palo Alto Networks Firewall provides configuration, logging, and reporting functions on a separate processor?

Which plane on a Palo Alto Networks Firewall provides configuration, logging, and reporting functions on a separate processor?A . managementB . network processingC . dataD . security processingView AnswerAnswer: A

January 22, 2021 No Comments READ MORE +

Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)

Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)A . facebookB . facebook-chatC . facebook-baseD . facebook-emailView AnswerAnswer: BC Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClV0CAK

January 22, 2021 No Comments READ MORE +

At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email?

At which stage of the Cyber-Attack Lifecycle would the attacker attach an infected PDF file to an email? A . DeliveryB . ReconnaissanceC . Command and ControlD . ExploitationView AnswerAnswer: D

January 22, 2021 No Comments READ MORE +

Match the Palo Alto Networks Security Operating Platform architecture to its description

DRAG DROP Match the Palo Alto Networks Security Operating Platform architecture to its description. View AnswerAnswer:

January 22, 2021 No Comments READ MORE +

Match the Cyber-Attack Lifecycle stage to its correct description

DRAG DROP Match the Cyber-Attack Lifecycle stage to its correct description. View AnswerAnswer:

January 21, 2021 No Comments READ MORE +

Order the steps needed to create a new security zone with a Palo Alto Networks firewall

DRAG DROP Order the steps needed to create a new security zone with a Palo Alto Networks firewall. View AnswerAnswer:

January 21, 2021 No Comments READ MORE +