Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?

Which Palo Alto Networks subscription service complements App-ID by enabling you to configure the next-generation firewall to identify and control access to websites and to protect your organization from websites hosting malware and phishing pages?A . Threat PreventionB . DNS SecurityC . WildFireD . URL FilteringView AnswerAnswer: D

May 24, 2021 No Comments READ MORE +

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?

Which Palo Alto Networks tool is used to prevent endpoint systems from running malware executables such as viruses, trojans, and rootkits?A . ExpeditionB . Cortex XDRC . AutoFocusD . App-IDView AnswerAnswer: B

May 22, 2021 No Comments READ MORE +

Which network analysis tool can be used to record packet captures?

Which network analysis tool can be used to record packet captures?A . Smart IP ScannerB . WiresharkC . Angry IP ScannerD . NetmanView AnswerAnswer: B

May 21, 2021 No Comments READ MORE +

Which technique changes protocols at random during a session?

Which technique changes protocols at random during a session?A . use of non-standard portsB . port hoppingC . hiding within SSL encryptionD . tunneling within commonly used servicesView AnswerAnswer: B

May 19, 2021 No Comments READ MORE +

Which option would be an example of PII that you need to prevent from leaving your enterprise network?

Which option would be an example of PII that you need to prevent from leaving your enterprise network?A . Credit card numberB . Trade secretC . National security informationD . A symmetric encryption keyView AnswerAnswer: A

May 19, 2021 No Comments READ MORE +