Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)
Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)A . eDirectory monitoringB . Client ProbingC . SNMP serverD . TACACSE . Active Directory monitoringF . Lotus DominoG . RADIUSView AnswerAnswer: B,D,G Explanation: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-id-concepts/user-mapping
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)
Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)A . QuarantineB . AllowC . ResetD . RedirectE . DropF . AlertView AnswerAnswer: B,C,E,F Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/policy/anti-spyware-profiles.html
Which profile or policy should be applied to protect against port scans from the internet?
Which profile or policy should be applied to protect against port scans from the internet?A . Interface management profile on the zone of the ingress interfaceB . Zone protection profile on the zone of the ingress interfaceC . An App-ID security policy rule to block traffic sourcing from the untrust...
Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)
Which three considerations should be made prior to installing a decryption policy on the NGFW? (Choose three.)A . Include all traffic types in decryption policyB . Inability to access websitesC . Exclude certain types of traffic in decryption policyD . Deploy decryption setting all at one timeE . Ensure throughput...
What are three considerations when deploying User-ID? (Choose three.)
What are three considerations when deploying User-ID? (Choose three.)A . Specify included and excluded networks when configuring User-IDB . Only enable User-ID on trusted zonesC . Use a dedicated service account for User-ID services with the minimal permissions necessaryD . User-ID can support a maximum of 15 hopsE . Enable...
Which three new script types can be analyzed in WildFire? (Choose three.)
Which three new script types can be analyzed in WildFire? (Choose three.)A . VBScriptB . JScriptC . MonoScriptD . PythonScriptE . PowerShell ScriptView AnswerAnswer: A,B,E Explanation: The WildFire cloud is capable of analyzing the following script types: ✑ JScript (.js) ✑ VBScript (.vbs) ✑ PowerShell Script (.ps1) https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/latest-wildfire-cloud-features/script-sample-support
When having a customer pre-sales call, which aspects of the NGFW should be covered?
When having a customer pre-sales call, which aspects of the NGFW should be covered?A . The NGFW simplifies your operations through analytics and automation while giving you consistent protection through exceptional visibility and control across the data center, perimeter, branch, mobile and cloud networksB . The Palo Alto Networks-developed URL...
How frequently should the related signatures schedule be set?
Palo Alto Networks publishes updated Command-and-Control signatures . How frequently should the related signatures schedule be set?A . Once a dayB . Once a weekC . Once every minuteD . Once an hourView AnswerAnswer: B
Which feature of PAN-OS can you talk about to address their requirement to optimize their business outcomes?
A customer is looking for an analytics tool that uses the logs on the firewall to detect actionable events on the network. They require something to automatically process a series of related threat events that, when combined, indicate a likely compromised host on their network or some other higher level...
What are two advantages of the DNS Sinkholing feature? (Choose two.)
What are two advantages of the DNS Sinkholing feature? (Choose two.)A . It forges DNS replies to known malicious domains.B . It monitors DNS requests passively for malware domains.C . It can be deployed independently of an Anti-Spyware Profile.D . It can work upstream from the internal DNS server.View AnswerAnswer:...