Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)

Which two components are utilized within the Single-Pass Parallel Processing architecture on a Palo Alto Networks Firewall? (Choose two.)A . Layer-IDB . User-IDC . QoS-IDD . App-IDView AnswerAnswer: B,D

February 28, 2022 No Comments READ MORE +

Which Palo Alto networks security operating platform service protects cloud-based application such as Dropbox and salesforce by monitoring permissions and shared and scanning files for Sensitive information?

Which Palo Alto networks security operating platform service protects cloud-based application such as Dropbox and salesforce by monitoring permissions and shared and scanning files for Sensitive information?A . Prisma SaaSB . AutoFocusC . PanoramaD . GlobalProtectView AnswerAnswer: A

February 28, 2022 No Comments READ MORE +

Which object would an administrator create to block access to all high-risk applications?

Which object would an administrator create to block access to all high-risk applications?A . HIP profileB . application filterC . application groupD . Vulnerability Protection profileView AnswerAnswer: B

February 28, 2022 No Comments READ MORE +

Application: _________?

All users from the internal zone must be allowed only Telnet access to a server in the DMZ zone. Complete the two empty fields in the Security Policy rules that permits only this type of access. Source Zone: Internal Destination Zone: DMZ Zone Application: _________? Service: ____________? Action: allow (Choose...

February 27, 2022 No Comments READ MORE +

Which statements is true regarding a Heatmap report?

Which statements is true regarding a Heatmap report?A . When guided by authorized sales engineer, it helps determine te areas of greatest security risk.B . It provides a percentage of adoption for each assessment area.C . It runs only on firewall.D . It provides a set of questionnaires that help...

February 27, 2022 No Comments READ MORE +

Actions can be set for which two items in a URL filtering security profile? (Choose two.)

Actions can be set for which two items in a URL filtering security profile? (Choose two.)A . Block ListB . Custom URL CategoriesC . PAN-DB URL CategoriesD . Allow ListView AnswerAnswer: A,D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/url-filtering/url-filtering-concepts/url-filtering-profile-actions

February 27, 2022 No Comments READ MORE +

What is a recommended consideration when deploying content updates to the firewall from Panorama?

What is a recommended consideration when deploying content updates to the firewall from Panorama?A . Before deploying content updates, always check content release version compatibility.B . Content updates for firewall A/P HA pairs can only be pushed to the active firewall.C . Content updates for firewall A/A HA pairs need...

February 27, 2022 No Comments READ MORE +

At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?

At which point in the app-ID update process can you determine if an existing policy rule is affected by an app-ID update?A . after clicking Check New in the Dynamic Update windowB . after connecting the firewall configurationC . after downloading the updateD . after installing the updateView AnswerAnswer: C...

February 27, 2022 No Comments READ MORE +

Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?

Which Security profile would you apply to identify infected hosts on the protected network using DNS traffic?A . URL trafficB . vulnerability protectionC . anti-spywareD . antivirusView AnswerAnswer: C

February 26, 2022 No Comments READ MORE +

Which option is part of the content inspection process?

Which option is part of the content inspection process?A . IPsec tunnel encryptionB . Packet egress processC . SSL Proxy re-encryptD . Packet forwarding processView AnswerAnswer: C

February 25, 2022 No Comments READ MORE +