Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)A . eDirectory monitoringB . Client ProbingC . SNMP serverD . TACACSE . Active Directory monitoringF . Lotus DominoG . RADIUSView AnswerAnswer: ABE Explanation: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-id-concepts/user-mapping
Match the WildFire Inline Machine Learning Model to the correct description for that model
DRAG DROP Match the WildFire Inline Machine Learning Model to the correct description for that model. View AnswerAnswer:
Which two features must be enabled to meet the customer’s requirements?
XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy. Which two features must be enabled to meet the customer’s requirements? (Choose two.)A . Virtual systemsB . HA active/activeC . HA active/passiveD . Policy-based forwardingView AnswerAnswer: B,D
Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?
Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?A . M-200B . M-600C . M-100D . Panorama VM-SeriesView AnswerAnswer: D Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boF1CAI
Which profile or policy should be applied to protect against port scans from the internet?
Which profile or policy should be applied to protect against port scans from the internet?A . Interface management profile on the zone of the ingress interfaceB . Zone protection profile on the zone of the ingress interfaceC . An App-ID security policy rule to block traffic sourcing from the untrust...
Which security profile on the NGFW includes signatures to protect you from brute force attacks?
Which security profile on the NGFW includes signatures to protect you from brute force attacks?A . Zone Protection ProfileB . URL Filtering ProfileC . Vulnerability Protection ProfileD . Anti-Spyware ProfileView AnswerAnswer: C
Which three new script types can be analyzed in WildFire? (Choose three.)
Which three new script types can be analyzed in WildFire? (Choose three.)A . VBScriptB . JScriptC . MonoScriptD . PythonScriptE . PowerShell ScriptView AnswerAnswer: A,B,E Explanation: The WildFire cloud is capable of analyzing the following script types: ✑ JScript (.js) ✑ VBScript (.vbs) ✑ PowerShell Script (.ps1) https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/latest-wildfire-cloud-features/script-sample-support
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)A . QuarantineB . AllowC . ResetD . RedirectE . DropF . AlertView AnswerAnswer: B,C,E,F Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/policy/anti-spyware-profiles.html
Which two of the following does decryption broker provide on a NGFW? (Choose two.)
Which two of the following does decryption broker provide on a NGFW? (Choose two.)A . Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only onceB . Eliminates the need for a third party SSL decryption option which allows you to...
What is the basis for purchasing Cortex XDR licensing?
What is the basis for purchasing Cortex XDR licensing?A . volume of logs being processed based on Datalake purchasedB . number of nodes and endpoints providing logsC . unlimited licensesD . number of NGFWsView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/cortex-xdr-overview/cortex-xdr-licenses/migrate-your-cortex-xdr-license