Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)

Which three methods used to map users to IP addresses are supported in Palo Alto Networks firewalls? (Choose three.)A . eDirectory monitoringB . Client ProbingC . SNMP serverD . TACACSE . Active Directory monitoringF . Lotus DominoG . RADIUSView AnswerAnswer: ABE Explanation: https://www.paloaltonetworks.com/documentation/80/pan-os/pan-os/user-id/user-id-concepts/user-mapping

July 19, 2022 No Comments READ MORE +

Match the WildFire Inline Machine Learning Model to the correct description for that model

DRAG DROP Match the WildFire Inline Machine Learning Model to the correct description for that model. View AnswerAnswer:

July 18, 2022 No Comments READ MORE +

Which two features must be enabled to meet the customer’s requirements?

XYZ Corporation has a legacy environment with asymmetric routing. The customer understands that Palo Alto Networks firewalls can support asymmetric routing with redundancy. Which two features must be enabled to meet the customer’s requirements? (Choose two.)A . Virtual systemsB . HA active/activeC . HA active/passiveD . Policy-based forwardingView AnswerAnswer: B,D

July 18, 2022 No Comments READ MORE +

Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?

Which is the smallest Panorama solution that can be used to manage up to 2500 Palo Alto Networks Next Generation firewalls?A . M-200B . M-600C . M-100D . Panorama VM-SeriesView AnswerAnswer: D Explanation: Reference: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA10g000000boF1CAI

July 18, 2022 No Comments READ MORE +

Which profile or policy should be applied to protect against port scans from the internet?

Which profile or policy should be applied to protect against port scans from the internet?A . Interface management profile on the zone of the ingress interfaceB . Zone protection profile on the zone of the ingress interfaceC . An App-ID security policy rule to block traffic sourcing from the untrust...

July 17, 2022 No Comments READ MORE +

Which security profile on the NGFW includes signatures to protect you from brute force attacks?

Which security profile on the NGFW includes signatures to protect you from brute force attacks?A . Zone Protection ProfileB . URL Filtering ProfileC . Vulnerability Protection ProfileD . Anti-Spyware ProfileView AnswerAnswer: C

July 17, 2022 No Comments READ MORE +

Which three new script types can be analyzed in WildFire? (Choose three.)

Which three new script types can be analyzed in WildFire? (Choose three.)A . VBScriptB . JScriptC . MonoScriptD . PythonScriptE . PowerShell ScriptView AnswerAnswer: A,B,E Explanation: The WildFire cloud is capable of analyzing the following script types: ✑ JScript (.js) ✑ VBScript (.vbs) ✑ PowerShell Script (.ps1) https://docs.paloaltonetworks.com/wildfire/u-v/wildfire-whats-new/latest-wildfire-cloud-features/script-sample-support

July 17, 2022 No Comments READ MORE +

Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)

Which four actions can be configured in an Anti-Spyware profile to address command-and-control traffic from compromised hosts? (Choose four.)A . QuarantineB . AllowC . ResetD . RedirectE . DropF . AlertView AnswerAnswer: B,C,E,F Explanation: https://www.paloaltonetworks.com/documentation/71/pan-os/pan-os/policy/anti-spyware-profiles.html

July 17, 2022 No Comments READ MORE +

Which two of the following does decryption broker provide on a NGFW? (Choose two.)

Which two of the following does decryption broker provide on a NGFW? (Choose two.)A . Decryption broker allows you to offload SSL decryption to the Palo Alto Networks next-generation firewall and decrypt traffic only onceB . Eliminates the need for a third party SSL decryption option which allows you to...

July 16, 2022 No Comments READ MORE +

What is the basis for purchasing Cortex XDR licensing?

What is the basis for purchasing Cortex XDR licensing?A . volume of logs being processed based on Datalake purchasedB . number of nodes and endpoints providing logsC . unlimited licensesD . number of NGFWsView AnswerAnswer: B Explanation: https://docs.paloaltonetworks.com/cortex/cortex-xdr/cortex-xdr-pro-admin/cortex-xdr-overview/cortex-xdr-licenses/migrate-your-cortex-xdr-license

July 16, 2022 No Comments READ MORE +