- All Exams Instant Download
What is the maximum volume of concurrent administrative account sessions?
What is the maximum volume of concurrent administrative account sessions?A . 2 B. Unlimited C. 10 D. 1View AnswerAnswer: B
Access to which feature requires the PAN-OS Filtering license?
Access to which feature requires the PAN-OS Filtering license? A. PAN-DB database B. DNS Security A. C. Custom URL categories D. URL external dynamic listsView AnswerAnswer: A Explanation: https://docs.paloaltonetworks.com/pan-os/8-1/pan-os-admin/getting-started/activate-licenses-and-subscriptions.html
Which type of single unified engine will get this result?
An administrator needs to add capability to perform real-time signature lookups to block or sinkhole all known malware domains. Which type of single unified engine will get this result?A . User-ID B. App-ID C. Security Processing Engine D. Content-IDView AnswerAnswer: D Explanation: Content-IDTM combines a real-time threat prevention engine with...
Which prevention technique will prevent attacks based on packet count?
Which prevention technique will prevent attacks based on packet count?A . zone protection profile B. URL filtering profile C. antivirus profile D. vulnerability profileView AnswerAnswer: A Explanation: DoS Protection adds another layer of defense against attacks on individual devices, which can succeed if the Zone Protection profile thresholds are above...
What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?
What is the minimum timeframe that can be set on the firewall to check for new WildFire signatures?A . every 30 minutes B. every 5 minutes C. once every 24 hours D. every 1 minuteView AnswerAnswer: D Explanation: Because new WildFire signatures are now available every five minutes, it is...
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)
Which five Zero Trust concepts does a Palo Alto Networks firewall apply to achieve an integrated approach to prevent threats? (Choose five.)A . User identification B. Filtration protection C. Vulnerability protection D. Antivirus E. Application identification F. Anti-spywareView AnswerAnswer: ACDEF
What do you configure if you want to set up a group of objects based on their ports alone?
What do you configure if you want to set up a group of objects based on their ports alone?A . address groups B. custom objects C. application groups D. service groupsView AnswerAnswer: D Explanation: Service = layer 4, Application = layer 7
Which rule type is appropriate for matching traffic occurring within a specified zone?
Which rule type is appropriate for matching traffic occurring within a specified zone?A . Universal B. Shadowed C. Intrazone D. InterzoneView AnswerAnswer: C
Based on the information, how is the SuperApp traffic affected after the 30 days have passed?
A security administrator has configured App-ID updates to be automatically downloaded and installed. The company is currently using an application identified by App-ID as SuperApp_base. On a content update notice, Palo Alto Networks is adding new app signatures labeled SuperApp_chat and SuperApp_download, which will be deployed in 30 days. Based...
An address object of type IP Wildcard Mask can be referenced in which part of the configuration?
An address object of type IP Wildcard Mask can be referenced in which part of the configuration?A . Security policy rule B. ACC global filter C. external dynamic list D. NAT address poolView AnswerAnswer: A Explanation: You can use an address object of type IP Wildcard Mask only in a...