Based on the security policy rules shown, ssh will be allowed on which port?

Based on the security policy rules shown, ssh will be allowed on which port? A . 80B . 53C . 22D . 23View AnswerAnswer: C

March 22, 2021 No Comments READ MORE +

Which policy is required to enable source NAT on the firewall?

An internal host wants to connect to servers of the internet through using source NAT. Which policy is required to enable source NAT on the firewall?A . NAT policy with source zone and destination zone specifiedB . post-NAT policy with external source and any destination addressC . NAT policy with...

March 22, 2021 No Comments READ MORE +

Which Security profile feature could have been used to prevent the communications with the command-and-control server?

The CFO found a malware infected USB drive in the parking lot, which when inserted infected their corporate laptop the malware contacted a known command-and-control server which exfiltrating corporate data. Which Security profile feature could have been used to prevent the communications with the command-and-control server?A . Create a Data...

March 22, 2021 No Comments READ MORE +

How is the hit count reset on a rule?

How is the hit count reset on a rule?A . select a security policy rule, right click Hit Count > ResetB . with a dataplane rebootC . Device > Setup > Logging and Reporting Settings > Reset Hit CountD . in the CLI, type command reset hitcount <POLICY-NAME>View AnswerAnswer: A

March 22, 2021 No Comments READ MORE +

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?

Which user mapping method could be used to discover user IDs in an environment with multiple Windows domain controllers?A . Active Directory monitoringB . Windows session monitoringC . Windows client probingD . domain controller monitoringView AnswerAnswer: A

March 21, 2021 No Comments READ MORE +

Match the Palo Alto Networks Security Operating Platform architecture to its description

DRAG DROP Match the Palo Alto Networks Security Operating Platform architecture to its description. View AnswerAnswer: Explanation: Threat Intelligence Cloud C Gathers, analyzes, correlates, and disseminates threats to and from the network and endpoints located within the network. Next-Generation Firewall C Identifies and inspects all traffic to block known threats...

March 21, 2021 No Comments READ MORE +

Which administrator type utilizes predefined roles for a local administrator account?

Which administrator type utilizes predefined roles for a local administrator account?A . SuperuserB . Role-basedC . DynamicD . Device administratorView AnswerAnswer: C

March 21, 2021 No Comments READ MORE +

Which option lists the attributes that are selectable when setting up an Application filters?

Which option lists the attributes that are selectable when setting up an Application filters?A . Category, Subcategory, Technology, and CharacteristicB . Category, Subcategory, Technology, Risk, and CharacteristicC . Name, Category, Technology, Risk, and CharacteristicD . Category, Subcategory, Risk, Standard Ports, and TechnologyView AnswerAnswer: B

March 20, 2021 No Comments READ MORE +

Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?

A network has 10 domain controllers, multiple WAN links, and a network infrastructure with bandwidth needed to support mission-critical applications. Given the scenario, which type of User-ID agent is considered a best practice by Palo Alto Networks?A . Windows-based agent on a domain controllerB . Captive PortalC . Citrix terminal...

March 20, 2021 No Comments READ MORE +

How is the hit count reset on a rule?

How is the hit count reset on a rule?A . select a security policy rule, right click Hit Count > ResetB . with a dataplane rebootC . Device > Setup > Logging and Reporting Settings > Reset Hit CountD . in the CLI, type command reset hitcount <POLICY-NAME>View AnswerAnswer: A

March 20, 2021 No Comments READ MORE +