Loading questions...
Updated
Which type of administrator account cannot be used to authenticate user traffic flowing through the firewall's data plane?
How frequently can WildFire updates be made available to firewalls?
Starting with PAN-OS version 9.1, which new type of object is supported for use within the User field of a Security policy rule?
Which link in the web interface enables a security administrator to view the Security policy rules that match new application signatures?
Based on the shown security policy, which Security policy rule would match all FTP traffic from the inside zone to the outside zone?
Which type of firewall configuration contains in-progress configuration changes?
Which three configuration settings are required on a Palo Alto Network firewall management interface? (Choose three.)
What is an advantage for using application tags?
At which point in the App-ID update process can you determine if an existing policy rule is affected by an App-ID update?
You receive notification about a new malware that infects hosts. An infection results in the infected host attempting to contact a command-and-control server.
Which Security Profile detects and prevents this threat from establishing a command-and-control connection?
Which User-ID mapping method should be used for an environment with users that do not authenticate to Active Directory?
Which statement is true regarding a Best Practice Assessment?
The PowerBall Lottery has reached an unusually high value this week. Your company has decided to raise morale by allowing employees to access the PowerBall
Lottery website (www.powerball.com) for just this week. However, the company does not want employees to access any other websites also listed in the URL filtering gambling category.
Which method allows the employees to access the PowerBall Lottery website but without unblocking access to the gambling URL category?
Which Palo Alto Networks service protects cloud-based applications such as Dropbox and Salesforce by monitoring permissions and shares and scanning files for sensitive information?
In a Security policy, what is the quickest way to reset all policy rule hit counters to zero?
Based on the Security policy rules shown, SSH will be allowed on which port?
You receive notification about new malware that is being used to attack hosts. The malware exploits a software bug in common application.
Which Security Profile detects and blocks access to this threat after you update the firewall's threat signature database?
Palo Alto Networks firewall architecture accelerates content inspection performance while minimizing latency using which two components? (Choose two.)
Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?
Given the topology, which zone type should zone A and zone B to be configured with?
An administrator needs to allow users to use their own office applications. How should the administrator configure the firewall to allow multiple applications in a dynamic environment?
Assume a custom URL Category Object of NO-FILES has been created to identify a specific website.
How can file uploading/downloading be restricted for the website while permitting general browsing access to that website?
Which URL Filtering profile action would you set to allow users the option to access a site only if they provide a URL admin password?
DRAG DROP -
Match the Palo Alto Networks Security Operating Platform architecture to its description.
Select and Place:
Which two statements are correct about App-ID content updates? (Choose two.)