Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)
Which three of the following actions must be taken to enable Credential Phishing Prevention? (Choose three.)A . Enable User Credential Detection B. Enable User-ID C. Define a Secure Sockets Layer (SSL) decryption rule base D. Enable App-ID E. Define a uniform resource locator (URL) Filtering profileView AnswerAnswer: A,B,E
What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?
What will a Palo Alto Networks next-generation firewall (NGFW) do when it is unable to retrieve a DNS verdict from the DNS cloud service in the configured lookup time?A . allow the request and all subsequent responses B. temporarily disable the DNS Security function C. block the query D. discard...
In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)
In PAN-OS 10.0 and later, DNS Security allows policy actions to be applied based on which three domains? (Choose three.)A . grayware B. command and control (C2) C. benign D. government E. malwareView AnswerAnswer: A,C,E
The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?
The ability to prevent users from resolving internet protocol (IP) addresses to malicious, grayware, or newly registered domains is provided by which Security service?A . WildFire B. DNS Security C. Threat Prevention D. loT SecurityView AnswerAnswer: B
Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?
Which of the following statements is valid with regard to Domain Name System (DNS) sinkholing?A . it requires the Vulnerability Protection profile to be enabled B. DNS sinkholing signatures are packaged and delivered through Vulnerability Protection updates C. infected hosts connecting to the Sinkhole Internet Protocol (IP) address can be...
Which Cloud-Delivered Security Service (CDSS) does Palo Alto Networks provide that will address this requirement?
A customer requires protections and verdicts for portable executable (PE) and executable and linkable format (ELF), as well as the ability to integrate with existing security tools. Which Cloud-Delivered Security Service (CDSS) does Palo Alto Networks provide that will address this requirement?A . Dynamic Unpacking B. WildFire C. DNS Security...
What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?
What is an advantage of having WildFire machine learning (ML) capability Inline on the firewall?A . It eliminates of the necessity for dynamic analysis in the cloud B. It enables the firewall to block unknown malicious files in real time and prevent patient zero without disrupting business productivity C. It...
Which feature of PAN-OS will address these requirements?
A customer requires an analytics tool with the following attributes: - Uses the logs on the firewall to detect actionable events on the network - Automatically processes a series of related threat events that, when combines, indicate a likely comprised host on the network - Pinpoints the area of risk...
What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?
What is the recommended way to ensure that firewalls have the most current set of signatures for up-to-date protection?A . Run a Perl script to regularly check for updates and alert when one is released B. Monitor update announcements and manually push updates to Crewall C. Store updates on an...
In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)
In Panorama, which three reports or logs will help identify the inclusion of a host source in a command-and-control (C2) incident? (Choose three.)A . SaaS reports B. data filtering logs C. WildFire analysis reports D. threat logs E. botnet reportsView AnswerAnswer: C,D,E