Which statement best describes the use of Policy Optimizer?

Which statement best describes the use of Policy Optimizer?A . Policy Optimizer can display which Security policies have not been used in the last 90 days B. Policy Optimizer on a VM-50 firewall can display which Layer 7 App-ID Security policies have unused applications C. Policy Optimizer can add or...

February 12, 2023 No Comments READ MORE +

What must be configured before setting up Credential Phishing Prevention?

What must be configured before setting up Credential Phishing Prevention?A . Anti Phishing Block Page B. Threat Prevention C. Anti Phishing profiles D. User-IDView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/threat-prevention/prevent-credential-phishing/set-up-credential-phishing-prevention

February 12, 2023 No Comments READ MORE +

Which Security policy rule is blocking the youtube application?

The firewall sends employees an application block page when they try to access Youtube. Which Security policy rule is blocking the youtube application?A . intrazone-default B. Deny Google C. allowed-security services D. interzone-defaultView AnswerAnswer: D

February 12, 2023 No Comments READ MORE +

When is the content inspection performed in the packet flow process?

When is the content inspection performed in the packet flow process?A . after the application has been identified B. after the SSL Proxy re-encrypts the packet C. before the packet forwarding process D. before session lookupView AnswerAnswer: A Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g00000 0ClVHCA0

February 12, 2023 No Comments READ MORE +

Which administrative management services can be configured to access a management interface?

Which administrative management services can be configured to access a management interface?A . HTTP, CLI, SNMP, HTTPS B. HTTPS, SSH telnet SNMP C. SSH: telnet HTTP, HTTPS D. HTTPS, HTTP. CLI, APIView AnswerAnswer: D Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/firewall-administration/management-interfaces You can use the following user interfaces to manage the Palo Alto Networks firewall:...

February 12, 2023 No Comments READ MORE +

What combination of Security policy and Security profile actions is correct?

An administrator would like to create a URL Filtering log entry when users browse to any gambling website. What combination of Security policy and Security profile actions is correct?A . Security policy = drop, Gambling category in URL profile = allow B. Security policy = deny. Gambling category in URL...

February 12, 2023 No Comments READ MORE +

What is the main function of the Test Policy Match function?

What is the main function of the Test Policy Match function?A . verify that policy rules from Expedition are valid B. confirm that rules meet or exceed the Best Practice Assessment recommendations C. confirm that policy rules in the configuration are allowing/denying the correct traffic D. ensure that policy rules...

February 12, 2023 No Comments READ MORE +

What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?

What in the minimum frequency for which you can configure the firewall too check for new wildfire antivirus signatures?A . every 5 minutes B. every 1 minute C. every 24 hours D. every 30 minutesView AnswerAnswer: B Explanation:

February 12, 2023 No Comments READ MORE +

What is the quickest way to reset the hit counter to zero in all the security policy rules?

Recently changes were made to the firewall to optimize the policies and the security team wants to see if those changes are helping. What is the quickest way to reset the hit counter to zero in all the security policy rules?A . At the CLI enter the command reset rules...

February 11, 2023 No Comments READ MORE +

Based on the screenshot what is the purpose of the group in User labelled ''it"?

Based on the screenshot what is the purpose of the group in User labelled ''it"? A . Allows users to access IT applications on all ports B. Allows users in group "DMZ" lo access IT applications C. Allows "any" users to access servers in the DMZ zone D. Allows users...

February 11, 2023 No Comments READ MORE +