WildFire can discover zero-day malware in which three types of traffic? (Choose three)
WildFire can discover zero-day malware in which three types of traffic? (Choose three)A . SMTPB . HTTPSC . FTPD . DNSE . TFTPView AnswerAnswer: A,B,C
What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?
What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?A . allow the request and all subsequent responsesB . temporarily disable the DNS Security functionC . block the queryD . discard...
Which three script types can be analyzed in WildFire? (Choose three)
Which three script types can be analyzed in WildFire? (Choose three)A . PythonScriptB . MonoSenptC . JScriptD . PowerShell ScriptE . VBScriptView AnswerAnswer: A,C,E
How should the site be made available?
Access to a business site is blocked by URL Filtering inline machine learning (ML) and considered as a false-positive. How should the site be made available?A . Disable URL Filtering inline MLB . Create a custom URL category and add it to the Security policyC . Create a custom URL...
A WildFire subscription is required for which two of the following activities? (Choose two)
A WildFire subscription is required for which two of the following activities? (Choose two)A . Filter uniform resource locator (URL) sites by category.B . Forward advanced file types from the firewall for analysis.C . Use the WildFire Application Programming Interface (API) to submit website links for analysisD . Enforce policy...
In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)
In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)A . SaaS reportsB . data filtering logsC . WildFire analysis reportsD . threat logsE . botnet reportsView AnswerAnswer: C,D,E
In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)
In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)A . graywareB . command and control (C2)C . benignD . governmentE . malwareView AnswerAnswer: A,C,E
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)A . Enable User Credential DetectionB . Enable User-IDC . Define a Secure Sockets Layer (SSL) decryption rule baseD . Enable App-IDE . Define a uniform resource locator (URL) Filtering profileView AnswerAnswer: B,C,E
What are two steps in this process?
A customer is starting to understand their Zero Trust protect surface using the Palo Alto Networks Zero Trust reference architecture. What are two steps in this process? (Choose two.)A . Validate user identities through authenticationB . Gain visibility of and control over applications and functionality in the traffic flow using...
What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)
What are two ways to manually add and remove members of dynamic user groups (DUGs)? (Choose two)A . Add the user to an external dynamic list (EDL).B . Tag the user using Panorama or the Web Ul of the firewall.C . Tag the user through the firewalls XML API.D ....