Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?

Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?A . Windows-based agent deployed on the internal networkB . PAN-OS integrated agent deployed on the internal networkC . Citrix terminal server deployed on the internal networkD . Windows-based...

May 1, 2020 No Comments READ MORE +

Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?

Which User-ID mapping method should be used for an environment with clients that do not authenticate to Windows Active Directory?A . Windows session monitoring via a domain controllerB . passive server monitoring using the Windows-based agentC . Captive PortalD . passive server monitoring using a PAN-OS integrated User-ID agentView AnswerAnswer:...

April 30, 2020 No Comments READ MORE +

Which option shows the attributes that are selectable when setting up application filters?

Which option shows the attributes that are selectable when setting up application filters?A . Category, Subcategory, Technology, and CharacteristicB . Category, Subcategory, Technology, Risk, and CharacteristicC . Name, Category, Technology, Risk, and CharacteristicD . Category, Subcategory, Risk, Standard Ports, and TechnologyView AnswerAnswer: B Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/7-1/pan-os-web-interface-help/objects/objects­application-filters

April 30, 2020 No Comments READ MORE +

Which statement is true regarding a Best Practice Assessment?

Which statement is true regarding a Best Practice Assessment?A . The BPA tool can be run only on firewallsB . It provides a percentage of adoption for each assessment areaC . The assessment, guided by an experienced sales engineer, helps determine the areas of greatest risk where you should focus...

April 29, 2020 No Comments READ MORE +

Match the Cyber-Attack Lifecycle stage to its correct description

DRAG DROP Match the Cyber-Attack Lifecycle stage to its correct description. View AnswerAnswer:

April 28, 2020 No Comments READ MORE +

How should the administrator configure the firewall to allow multiple applications in a dynamic environment?

An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?A . Create an Application Filter and name it Office Programs, then filter it on the business-systems category, office-programs subcategoryB . Create an Application...

April 28, 2020 No Comments READ MORE +

Which utility should the company use to identify out-of-date or unused rules on the firewall?

A company moved its old port-based firewall to a new Palo Alto Networks NGFW 60 days ago. Which utility should the company use to identify out-of-date or unused rules on the firewall?A . Rule Usage Filter > No App SpecifiedB . Rule Usage Filter >Hit Count > Unused in 30...

April 27, 2020 No Comments READ MORE +

Which security policy is blocking the YouTube application?

Employees are shown an application block page when they try to access YouTube. Which security policy is blocking the YouTube application?A . intrazone-defaultB . Deny GoogleC . allowed-security servicesD . interzone-defaultView AnswerAnswer: D

April 27, 2020 No Comments READ MORE +

How many zones can an interface be assigned with a Palo Alto Networks firewall?

How many zones can an interface be assigned with a Palo Alto Networks firewall?A . twoB . threeC . fourD . oneView AnswerAnswer: D Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-web-interface-help/network/network­zones/security-zone-overview

April 27, 2020 No Comments READ MORE +

Which two configuration settings shown are not the default? (Choose two.)

Which two configuration settings shown are not the default? (Choose two.) A . Enable Security LogB . Server Log Monitor Frequency (sec)C . Enable SessionD . Enable ProbingView AnswerAnswer: BC Explanation: Reference: https://docs.paloaltonetworks.com/pan-os/8-0/pan-os-web-interface-help/user-identification/ device-user-identification-user-mapping/enable-server-monitoring

April 27, 2020 No Comments READ MORE +