Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?
Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?A . Windows-based agent deployed on the internal networkB . PAN-OS integrated agent deployed on the internal networkC . Citrix terminal server deployed on the internal networkD . Windows-based...
Which utility should the company use to identify out-of-date or unused rules on the firewall?
A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?A . Rule Usage Filter > No App SpecifiedB . Rule Usage Filter >Hit Count > Unused in 30...
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.
Choose the option that correctly completes this statement. A Security Profile can block or allow traffic ____________.A . on either the data place or the management plane.B . after it is matched by a security policy rule that allows traffic.C . before it is matched to a Security policy rule.D...
How many zones can an interface be assigned with a Palo Alto Networks firewall?
How many zones can an interface be assigned with a Palo Alto Networks firewall?A . twoB . threeC . fourD . oneView AnswerAnswer: D Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/network/networkzones/security-zone-overview
Which dataplane layer of the graphic shown provides pattern protection for spyware and vulnerability exploits on a Palo Alto Networks Firewall?
Which dataplane layer of the graphic shown provides pattern protection for spyware and vulnerability exploits on a Palo Alto Networks Firewall? A . Signature MatchingB . Network ProcessingC . Security ProcessingD . Data InterfacesView AnswerAnswer: A
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?
Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?A . Windows session monitoring via a domain controllerB . passive server monitoring using the Windows-based agentC . Captive PortalD . passive server monitoring using a PAN-OS integrated User-ID agentView AnswerAnswer:...
Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)
Which two App-ID applications will need to be allowed to use facebook-chat? (Choose two.)A . facebookB . facebook-chatC . facebook-baseD . facebook-emailView AnswerAnswer: BC Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000ClV0CAK
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?
Which license must an Administrator acquire prior to downloading Antivirus Updates for use with the firewall?A . Threat PreventionB . WildFireC . AntivirusD . URL FilteringView AnswerAnswer: A Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/install-content-andsoftware-updates.html
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)
What are two differences between an implicit dependency and an explicit dependency in App-ID? (Choose two.)A . An implicit dependency does not require the dependent application to be added in the security policyB . An implicit dependency requires the dependent application to be added in the security policyC . An...
Actions can be set for which two items in a URL filtering security profile? (Choose two.)
Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: AD