In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A

June 29, 2022 No Comments READ MORE +

Which statement is true regarding a Prevention Posture Assessment?

Which statement is true regarding a Prevention Posture Assessment?A . The Security Policy Adoption Heatmap component filters the information by device groups, serial numbers, zones, areas of architecture, and other categoriesB . It provides a set of questionnaires that help uncover security risk prevention gaps across all areas of network...

June 29, 2022 No Comments READ MORE +

Which two configuration settings shown are not the default? (Choose two.)

Which two configuration settings shown are not the default? (Choose two.) A . Enable Security LogB . Server Log Monitor Frequency (sec)C . Enable SessionD . Enable ProbingView AnswerAnswer: B,C

June 29, 2022 No Comments READ MORE +

Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?

Which service protects cloud-based applications such as Dropbox and Salesforce by administering permissions and scanning files for sensitive information?A . ApertureB . AutoFocusC . Parisma SaaSD . GlobalProtectView AnswerAnswer: C

June 29, 2022 No Comments READ MORE +

Which URL profiling action does not generate a log entry when a user attempts to access that URL?

Which URL profiling action does not generate a log entry when a user attempts to access that URL?A . OverrideB . AllowC . BlockD . ContinueView AnswerAnswer: B References:

June 29, 2022 No Comments READ MORE +

Which two security profile types can be attached to a security policy? (Choose two.)

Which two security profile types can be attached to a security policy? (Choose two.)A . antivirusB . DDoS protectionC . threatD . vulnerabilityView AnswerAnswer: A,D

June 28, 2022 No Comments READ MORE +

Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?

Which User-ID agent would be appropriate in a network with multiple WAN links, limited network bandwidth, and limited firewall management plane resources?A . Windows-based agent deployed on the internal networkB . PAN-OS integrated agent deployed on the internal networkC . Citrix terminal server deployed on the internal networkD . Windows-based...

June 28, 2022 No Comments READ MORE +

In a security policy what is the quickest way to rest all policy rule hit counters to zero?

In a security policy what is the quickest way to rest all policy rule hit counters to zero?A . Use the CLI enter the command reset rules allB . Highlight each rule and use the Reset Rule Hit Counter > Selected Rules.C . use the Reset Rule Hit Counter >...

June 28, 2022 No Comments READ MORE +

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?

In which stage of the Cyber-Attack Lifecycle would the attacker inject a PDF file within an email?A . WeaponizationB . ReconnaissanceC . InstallationD . Command and ControlE . ExploitationView AnswerAnswer: A

June 28, 2022 No Comments READ MORE +

Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?

Which interface type is part of a Layer 3 zone with a Palo Alto Networks firewall?A . ManagementB . High AvailabilityC . AggregateD . AggregationView AnswerAnswer: C

June 28, 2022 No Comments READ MORE +